Photo

Securing K8s: back and forth to RBAC Enforce

Roman Levkin

from Exness (Limassol)

About speaker

IT & ITSec folk who managed to look at the industry from different points of view: the integrator's, the vendor's and the customer's. Mostly on the "blue" side.

About speakers company

The leading multi-asset broker.

Abstracts

specific

The Great and Terrible – Access Control! And spiced up with a dash of YAML! Of course, you've heard about Role-Based Access Control (RBAC) in K8s, and you've probably seen more than one presentation about how it's implemented in Kubernetes API. But I invite you to dive deeper into what "configuring access in K8s" really means in practice:
- reality vs. theory: RBAC scope and limitations;
- other K8s-native controls and 3-party solutions for the rescue;
- access control and platform components: GitOps, monitoring, storage, cloud... you got the idea;
- the role of RBAC in building K8s multi-tenancy.
This is an intermediate-level technical talk, blending storytelling with practical tips and recommendations, aimed at helping you master this not the easiest, but one of the most powerful components of K8s security.

The Program Committee has not yet taken a decision on this talk

other talks of this topic

Photo
CNCF sandbox project k8up under the hood

Aarno Aukia

VSHN - The DevOps Company

specific
Photo
DevOps for AI: running LLMs in production with Kubernetes and KubeFlow

Aarno Aukia

VSHN - The DevOps Company

specific
Photo
How do we deliver Agile Service Management?

Cristan Massey

Pearson Education

specific
Photo
How to Measure PromQL/MetricsQL Expression Complexity

Roman Khavronenko

VictoriaMetrics

specific
Photo
Knowledge Discovery Efficiency: The FeedHenry Case Study

Benjamin Igna

Stellar Work GmbH

specific
Photo
DevOps done right: RBAC

Daniel Drack

FullStackS GmbH

specific
Photo
Guarding the ML Galaxy: Beyond Accuracy to Privacy and Security

Rishabh Misra

Attentive Mobile Inc

broad
Photo
CRaCing Java Snapshots

Pasha Finkelshteyn

BellSoft

specific
Photo
Actionable Observability

Lesley Cordero

The New York Times

broad
Photo
Pentesting Kubernetes Services in the Cloud

Sergey Chubarov

Independent consultant

specific
Photo
AI for Next-Gen Security: OpenAI and Copilot for Security Synergy

Sergey Chubarov

Independent consultant

specific
Photo
Empowering Developers: Building an Application Catalogue with Crossplane

Aarno Aukia

VSHN - The DevOps Company

specific
Photo
Reduce Alert Fatigue with AIOps

Birol Yildiz

ilert GmbH

broad
Photo
K8s load testing at scale with k6-operator

Ant(on) Weiss

PerfectScale

specific
Photo
Platform Engineering for a Greener Future

Pini Reznik

re:cinq

broad
Photo
An Intro to Kubernetes Hardening

Ayesha Kaleem

MBition GmbH

broad
Photo
Autonomous Agents and Their Role in Incident Management

Yoseph Reuveni

Not Affiliated

specific
Photo
Delivering SaaS on-prem with Cloud-native tools

George Hantzaras

MongoDB

specific
Photo
Behind the curtain of PowerShell cmdlets

Sergey Chubarov

Independent consultant

specific
Photo
The Balancing Act of Reliability

Yusuf Aytas

Workday

broad