ATT&CKing Kubernetes: A technical deep dive into the new ATT&CK for Containers
2021-07-07, 14:00–14:35 (Europe/Paris), Zoom room

This presentation aims to talk about different attack scenarios leveraging Kubernetes clusters. We'll dig deeper into a real-world attack scenario using real-world applications to demonstrate different ways attackers and malicious users can use to exploit your cluster and the applications running on it. But first, we’ll give an overview about Kubernetes and its architecture, covering the main components from the Control Plane and the Worker Nodes. Then, we'll use the K8s Threat Matrix and the MITRE ATT&CK for Containers published this year to discuss the Tactics, Techniques and Procedures to demonstrate the Recon, Exploitation and Post-Exploitation phases. After that, we'll provide some best practices to securing your cluster based on the scenarios and the CIS Benchmarks for Kubernetes. We'll show how to use Role-based access control (RBAC) for Access Control, to enable audit logs for security and troubleshooting, and we'll set up some network policies to avoid communication between pods and prevent any lateral movement from attackers.

​Introduction to Kubernetes
Outline of K8s Architecture​
Control Plane
Kube API Server
Kube Controller Manager
Kube Scheduler
Cloud Controller Manager
Worker Nodes
CRE (Container Runtime Engine)
- K8s Threat Matrix ​
- MITRE ATT&CK for Containers ​(and K8s)
- K8s ATT&CK Scenario & Flow​
Attacking K8s​
- Recon / Initial Access​
- Exploitation / Execution
- Post-Exploitation / Persistence​
Defending K8s​
- API Server​
- CIS Benchmark​
- Image Scanning​
- Runtime Protection​
- Network Policy​
- Pod Security Policy (PSP)​ - Deprecated
- PSP Alternatives​
- Audit Logs

Magno Logan works as an Information Security Specialist for Trend Micro. He specializes in Cloud, Container and Application Security Research, Threat Modelling and Red Teaming. He has been tapped as a resource speaker for numerous security conferences around the globe. He is also a member of the CNCF SIG-Security team.