Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Identifying Vulnerabilities in Public Kubernetes Helm Charts

Platform Engineering via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This 46-minute webinar examines the security risks associated with public Kubernetes Helm charts as they become increasingly popular for application deployment. Discover how seemingly innocuous Helm charts can harbor misconfigurations, insecure defaults, and vulnerable dependencies that attackers can exploit for privilege escalation, data theft, or complete cluster compromise. Explore real-world incidents like the Codecov supply chain attack and theoretical vectors such as "ChartSploit" to understand how chart vulnerabilities can be weaponized. Learn practical security strategies including auditing deployments, verifying chart integrity, implementing strict access controls, and adopting DevSecOps practices. Presented by Nigel Douglas, Head of Developer Relations at Cloudsmith, this session provides platform engineers, security analysts, and DevOps practitioners with essential knowledge to identify and mitigate risks in Helm chart ecosystems. For follow-up questions, join the discussion on the Platform Engineering Slack.

Syllabus

Identifying vulnerabilities in public Kubernetes Helm charts

Taught by

Platform Engineering

Reviews

Start your review of Identifying Vulnerabilities in Public Kubernetes Helm Charts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.