Attack and Detect Kubernetes: Aerial Combat Training - Aviata Cloud Solo Flight Challenge Chapter 4

  • Thursday, 25 Jul 2024 10:00AM EDT (25 Jul 2024 14:00 UTC)
  • Speaker: Shaun McCullough

In the last chapter, the Aviata team built a Kubernetes cluster with running applications from the ground up. In this chapter, we will approach that Kubernetes cluster from the eyes of an attacker, identifying a vulnerability and hacking the platform. We will then look at the logging and telemetry that we can get from AWS's Elastic Kubernetes Service (EKS), which detects and investigates the attack.

Each monthly workshop in the series is independent of the others. There are no technical or educational dependencies from one to the others.

Who Should Attend

This workshop is ideal for cybersecurity professionals and cloud engineers ready to dive deep into Kubernetes security, this workshop offers hands-on experience in attacking and defending AWS's Elastic Kubernetes Service, enhancing your skills in vulnerability identification, logging, and investigation.

Learning Objectives

  • Understand the types of attacks against Kubernetes
  • Perform an attack against your live system
  • Understand how to set up and operate log collection for EKS
  • Use AWS services to perform an investigation.

Scroll down for prerequisites and laptop requirements.

Aviata Cloud Solo Flight Challenge - Chapter 4
Prerequisite Knowledge
  • Basic understanding of the AWS console
  • Basic understanding of Kubernetes
  • Basic familiarity with container technologies
Suggested Preparation Resources

* Aviata Cloud Solo Flight Challenge Chapter 3: Wings of Innovation: Transitioning to Containerization

This workshop supports content and knowledge from SEC541: Cloud Security Threat Detection

Workshop Series

Follow the Aviata Cloud Solo Flight Challenge Workshop Series throughout 2024 with free monthly cloud security workshops that will walk you through how various knowledge and hands-on skills work together to create a secure cloud environment for your organization. Read the associated blog post here.