Lightspin webishop is a unique format of half webinar-half workshop. In this webishop we will dive into security concepts in Kubernetes, including:
You will learn
What is Kubernetes
Basic security controls in K8S clusters
The dark side of Kubernetes
Hands on lab
The 7 most common attack paths across AWS, Azure, GCP, and Kubernetes as seen on the Lightspin Cloud Native Application Protection Platform.
The cloud security community must move beyond one-off results and alerts to a context-driven understanding of true risk within the cloud environment. True risk is only possible to be determined with the deep understanding of the cloud, a bespoke understanding of the environment, and the comprehensive data pulled from existing tools. The attack path platform approach cohesively analyzes the cloud environment from an attacker’s perspective, showing SecOps and DevOps teams the true prioritized list of actions needed to mitigation all potential attack vectors, and eliminate risk.
Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a list of the 2022 Top 7 Cloud Attack Paths across AWS, Azure, GCP, and Kubernetes as seen on the Lightspin Cloud Native Application Protection Platform. The attack paths were selected based on frequency, criticality, and impact. Our attack paths are based on Lightspin’s cloud attack path taxonomy and tie to the MITRE ATT&CK Cloud Matrix for Enterprise. Check out this GitHub report which includes the applicable MITRE ATT&CK TTPs with formatting in .xls, .json, and .svg produced via the MITRE ATT&CK Navigator (https://mitre-attack.github.io/attack-navigator/) for easy reference and utility in reproduction, table-top exercises, threat modeling, etc.
Born on the graph, Lightspin’s cloud security platform helps Security and Dev Teams eliminate critical vulnerabilities and maximize their productivity by proactively detecting all security risks and intelligently prioritizing the most critical issues.
Lightspin’s attack path expertise and deep dive technology provides organizations of all sizes visualization, prioritization, and remediation for SecOps and DevOps teams. To see attack paths in action, sign up for a free trial and get access to a demo environment and other learning materials. If you’d like a personalized demo and deep dive with our technical solutions team, book a demo today.