All Talks

Crafty Requests: Deep Dive into a Kubernetes CVE

You may have heard about CVE-2018-1002105, one of the most severe Kubernetes security vulnerabilities of all time. But how does this flaw work? How can it be exploited, and what does it all mean? This deep dive will walk the audience through the Kubernetes back end, going over relevant concepts like aggregated API servers, the kubelet API, and permissions for namespace-constrained users. We will explain the details of how this flaw works, how a cluster’s moving parts can fit together to create a …

You might be interested in:

April 2019 Backend
A New Lens for Venture Capital A New Lens for Venture Capital

A New Lens for Venture Capital

Brittany Davis, Backstage Capital

April 2019 Backend
How to Service Dev Teams with a Container Platform How to Service Dev Teams with a Container Platform

How to Service Dev Teams with a Container Platform

Sujatha Bayyapureddy, McKesson Roshan Kadasani, McKesson