Master AI & Data—50% Off Udacity (Code CC50)
Power BI Fundamentals - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the security vulnerabilities lurking within Helm charts and learn to protect your Kubernetes deployments from supply chain attacks in this comprehensive conference talk. Discover how misconfigured charts, unverified dependencies, and inadequate RBAC settings can expose your infrastructure to serious threats including privilege escalation and data exfiltration. Examine real-world security scenarios through hands-on experience with an interactive Instruqt lab environment that demonstrates practical vulnerability scanning techniques using open-source tools. Master essential security practices for organizations running Amazon EKS, Google GKE, or self-managed Kubernetes clusters, including proper chart signing and verification processes before production deployment. Gain actionable insights into securing your Helm package management workflow and implementing robust security measures to safeguard your Kubernetes infrastructure against evolving supply chain threats.
Syllabus
What supply chain risks are hidden in your Helm charts? - Nigel Douglas
Taught by
Platform Engineering