Get 20% off all career paths from fullstack to AI
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This 46-minute webinar examines the security risks associated with public Kubernetes Helm charts as they become increasingly popular for application deployment. Discover how seemingly innocuous Helm charts can harbor misconfigurations, insecure defaults, and vulnerable dependencies that attackers can exploit for privilege escalation, data theft, or complete cluster compromise. Explore real-world incidents like the Codecov supply chain attack and theoretical vectors such as "ChartSploit" to understand how chart vulnerabilities can be weaponized. Learn practical security strategies including auditing deployments, verifying chart integrity, implementing strict access controls, and adopting DevSecOps practices. Presented by Nigel Douglas, Head of Developer Relations at Cloudsmith, this session provides platform engineers, security analysts, and DevOps practitioners with essential knowledge to identify and mitigate risks in Helm chart ecosystems. For follow-up questions, join the discussion on the Platform Engineering Slack.
Syllabus
Identifying vulnerabilities in public Kubernetes Helm charts
Taught by
Platform Engineering