Hi [[ session.user.profile.firstName ]]

Kubernetes: Anatomy of the Shopify Attack & How to Defend Your Infrastructure

The potential attack on Shopify’s Kubernetes-based infrastructure grabbed headlines last year. This highlights the fact that Kubernetes managed applications require a different approach to network security. The differences between the major cloud providers and the complexity of mixed/hybrid-cloud networks only further complicate the issue and make attack surfaces larger and open to a wider range of attack vectors.

It’s no wonder engineers across various disciplines are hungry to understand how attacks can happen and what they can do to implement security measures to stop them.

Join Garwood Pang, Vulnerability Researcher at Tigera, for this webinar where you will:

- Follow step-by-step as he launches an attack similar to the Shopify vulnerability but adding to it with previously known breaches, bug reports, and blog posts

- See how the same attack can be detected and stopped before the network is compromised

- Learn how a zero-trust security model and a network security solution explicitly made for Kubernetes Infrastructure can limit virtually all attacks, regardless of vector

This webinar is ideal for security engineers, platform engineers, DevOps engineers, network engineers, and any other technical role involved in ensuring the security of a Kubernetes orchestrated infrastructure.
Recorded Nov 7 2019 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Garwood Pang, Security Researcher at Tigera
Presentation preview: Kubernetes: Anatomy of the Shopify Attack & How to Defend Your Infrastructure

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Extending Your FortiGate Next-Gen Firewall to Kubernetes Recorded: Jun 17 2020 58 mins
    Nicola Kabar, Solutions Architect - Tigera; Ali Bidabadi, Director of Cloud Architecture - Fortinet
    Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls.

    Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiGate Next-Gen firewalls and Calico Enterprise, you gain full visibility into the container environment and can define fine-grained policies to determine which Kubernetes workloads are allowed to talk to the enterprise’s crown jewels running outside the Kubernetes cluster.

    In this webinar, you will learn how Calico Enterprise and FortiGate enables you to:
    Implement network security control requirements in Kubernetes
    Dynamically populate Kubernetes objects in FortiGate to enforce security policies
    Gain deep visibility into network traffic within your Kubernetes clusters.
  • Kubernetes Security: Detecting Lateral Movement and Defending Against Attackers Recorded: May 12 2020 50 mins
    Garwood Pang, Tigera Threat Defense Researcher
    As Kubernetes matures, gone are the days when we can fully compromise a cluster by just taking over a pod and sending commands to the Kubernetes API service. RBAC and other Kubernetes security features force attackers to pivot at least once to find the right vulnerable pod/service account with the right privileges to take over a cluster. The attack surface grows as the cluster gets bigger and more third-party applications are deployed. By understanding the attacker’s workflow and gaining visibility into the relevant connections, we are able to identify our cluster’s weak points and limit the attacker’s reach.

    In this webinar, we will:
    * Examine some common techniques that an attacker can use to gain intel about your cluster’s setup once they are inside
    * Show a demo of an attacker gaining root access by impersonating a sample third-party application after exploiting a vulnerable API call
    * Visualize the attack using Calico Enterprise and review mitigation strategies
  • Advanced Kubernetes Network Design Recorded: Apr 22 2020 60 mins
    Bikram Gupta, Solutions Architect - Customer Success at Tigera
    Learn from an expert. At Tigera, we work with hundreds of Calico and Calico Enterprise customers every year and have learned a very important lesson in the process: Designing networks and troubleshooting a broken network are difficult problems.

    As a Kubernetes architect, what you get from the network team is real estate (racks/compute infrastructure) and an underlay network (nodes that can talk to each other). You have to plan, architect, get the buy-in and implement the network for the actual applications (pods) running in the cluster. You can’t design something completely new if you are constrained by ToRs (top of rack switches), core network fabric, or compliance/security requirements.

    This session will begin with a high-level overview of pod networking scenarios and packet path. Then we will do a deep-dive into IP address management and BGP routing design, with an example of each. As part of BGP routing, we’ll walk through various network design options. Finally we conclude with a recommended template for on-prem network design
  • Kubernetes Threat Intelligence: Detecting Domain Generation Algorithms Recorded: Apr 14 2020 34 mins
    Manoj Ahuje & Chris Gong - Tigera Threat Intelligence Research Team
    Malicious actors often use Domain Generation Algorithms (DGA) to exploit the DNS protocol and execute command-and-control (C & C) malware attacks. DGAs are very difficult to detect due to their dynamic and unpredictable nature. Traditional approaches to data security cannot contain DGA threats, with the problem exacerbated by the migration to Kubernetes and the cloud.

    Join us for this webinar where we share the latest insights into DGAs, the risks they present, along with best practices to speed detection and reduce risk.
    In this session, you will learn:

    - How the DNS / DGA / APT kill chain makes DGAs so hard to detect
    Why effective monitoring and visibility into Kubernetes and the cloud is essential
    - How you can detect a compromised workload with Calico Enterprise’s DGA machine learning capability
  • Extending Your Fortinet Next-Generation Firewall to Kubernetes Recorded: Mar 17 2020 49 mins
    Nico Kabar, Solutions Architect with Tigera
    Companies are leveraging the power of Kubernetes to accelerate the delivery of resilient and scalable applications to meet the pace of business. These applications are highly dynamic, making it operationally challenging to securely connect to databases or other resources protected behind firewalls.

    Tigera and Fortinet have joined forces to solve this operational challenge. With the combination of FortiGate firewalls and Calico Enterprise, you gain full visibility into the container environment and can define fine-grained policies to determine which Kubernetes workloads are allowed to talk to the enterprise’s crown jewels running outside the Kubernetes cluster.

    In this webinar, you will learn how Calico Enterprise and FortiGate enable you to:
    + Implement network security control requirements in Kubernetes
    + Dynamically populate Kubernetes objects in FortiGate firewalls to enforce security policies
    + Gain deep visibility into network traffic within your Kubernetes clusters.

    After this webinar, you’ll also understand why Calico has been chosen as the preferred network security solution by the leading managed Kubernetes services – Amazon EKS, Azure AKS, Google GKE, IBM IKS, and more – as well as powering several of the world’s largest Kubernetes clusters.
  • Kubernetes - Automating Access Controls When Connecting to External Resources Recorded: Feb 26 2020 19 mins
    Andy Wright with Tigera
    No matter where you are in your Kubernetes journey, eventually you’ll have to connect your k8s cluster to external resources like databases, cloud services, and third-party APIs. A majority of existing workloads are non-Kubernetes, and at some point, your Kubernetes applications will need to communicate with them.

    Before you can do that, Security teams, as well as database and application owners, will require you to limit access to specific individuals or groups — and nearly every application has dependencies external to Kubernetes that require some level of access control. However, Kubernetes does not natively enable fine-grained egress access controls..

    In this webinar, you will learn how to:

    + Securely migrate k8s workloads/applications into production and control access to external resources
    + Limit k8s egress to external end-points on a granular, per-pod basis
    + Simplify this process using Calico Enterprise

    The webinar is ideal for Platform Engineers, Cloud Engineers, and anyone else that is responsible for deploying and maintaining a Kubernetes Platform.
  • Four Ways to Accelerate Your Kubernetes Project Recorded: Jan 30 2020 36 mins
    Andy Wright with Tigera
    As the founders of Project Calico, we work with hundreds of teams every year to help them avoid obstacles and gain the most value from Calico.

    We observe a common "Kubernetes Journey" that most infrastructure and platform teams progress through as they deploy Kubernetes to their organizations, and will share that journey in this webinar.

    Sometimes we are pulled into projects on fire. Without guidance, many projects run into problems of scale, enterprise integration, and cross-functional alignment that can slow everything to a grinding halt. We've seen all these problems and can help.

    That is why we created Calico Essentials - our solution to have you aligned with industry experts throughout your Kubernetes journey.

    In this webinar, you'll learn the four ways Calico Essentials can help accelerate your Kubernetes project.

    - Training and education for new team members and other stakeholders
    - Best practices workshops on network and network security design
    - Help you operationalize Calico to work with the rest of your tools, infrastructure, and processes
    - Troubleshooting strategies, tips, and tricks
  • 5 Ways to Detect Malicious Activity & Protect Your Kubernetes Workloads Recorded: Dec 17 2019 44 mins
    Manoj Ahuje, Threat Intelligence Research Engineer. Tigera
    Organizations are rapidly moving more and more mission-critical applications to Kubernetes and the cloud to reduce costs, achieve faster deployment times, and improve operational efficiencies. But security teams are struggling to achieve a strong security posture with Kubernetes and cloud-based resources because of the inability to apply conventional security practices in the cloud environment.

    Join Threat Intelligence Research Engineer, Manoj Ahuje, for this webinar where he will cover five different attack scenarios on cloud-based Kubernetes infrastructure, and how to catch these malicious activities at each stage with Calico Enterprise and Global Alerts, a new feature just released.

    Don’t miss this technical webinar, register to attend now.
  • Kubernetes: Anatomy of the Shopify Attack & How to Defend Your Infrastructure Recorded: Nov 7 2019 58 mins
    Garwood Pang, Security Researcher at Tigera
    The potential attack on Shopify’s Kubernetes-based infrastructure grabbed headlines last year. This highlights the fact that Kubernetes managed applications require a different approach to network security. The differences between the major cloud providers and the complexity of mixed/hybrid-cloud networks only further complicate the issue and make attack surfaces larger and open to a wider range of attack vectors.

    It’s no wonder engineers across various disciplines are hungry to understand how attacks can happen and what they can do to implement security measures to stop them.

    Join Garwood Pang, Vulnerability Researcher at Tigera, for this webinar where you will:

    - Follow step-by-step as he launches an attack similar to the Shopify vulnerability but adding to it with previously known breaches, bug reports, and blog posts

    - See how the same attack can be detected and stopped before the network is compromised

    - Learn how a zero-trust security model and a network security solution explicitly made for Kubernetes Infrastructure can limit virtually all attacks, regardless of vector

    This webinar is ideal for security engineers, platform engineers, DevOps engineers, network engineers, and any other technical role involved in ensuring the security of a Kubernetes orchestrated infrastructure.
  • The Problem With Kubernetes And Firewalls, And How To Solve It Recorded: Oct 10 2019 42 mins
    Andy Wright, Tigera
    Containers and Kubernetes adoption are gaining incredible momentum in enterprise organizations. Gartner estimates that 75% of organizations will be running containerized applications by 2022.

    However, there are many challenges to moving containerized applications to internet-facing environments while maintaining security:

    - Firewalls are necessary but cannot protect Kubernetes pods that keep changing IP addresses
    - Security processes are designed for and rely on a zone-based architecture, but Kubernetes doesn’t fit in that architecture
    - Kubernetes Network Policies are a new concept for network and security teams to learn, but they are stretched too thin and have no time to invest in learning them

    These problems would go away if the security team’s existing tools and processes worked for Kubernetes.

    Attend this webinar and learn how Tigera is the first and only Kubernetes security solution to integrate with the security team’s firewall manager to implement their security controls in Kubernetes. The presentation will include a live demo using Tigera Secure and the Palo Alto Networks Panorama firewall manager.
  • Understanding & Troubleshooting Kubernetes Connectivity Issues Recorded: Sep 12 2019 62 mins
    Karthik Prabhakar, Sr. Director, Solution Architecture, Tigera
    Kubernetes is a robust, stable, and reliable environment to run modern applications. But, like all software, issues can arise that require troubleshooting. When problems occur with the containerized microservices, Kubernetes can reschedule workloads or replace entire nodes with ease, but when connectivity issues arise, you need an understanding of how Kubernetes networking works and the right tools to help identify and solve the issue.

    Join Karthik Prabhakar, Sr. Director, Solutions Engineering with Tigera, for a live webinar on Thursday, September 12 at 10AM PT, 1PM ET where you will learn how to identify, understand, and solve the most common Kubernetes connectivity issues.
  • What’s New in Tigera Calico: An Update on Recent Features & Enhancements Recorded: Aug 7 2019 33 mins
    Eddie Esquivel, Sr. Solutions Engineer with Tigera
    Free and Open Source, Tigera Calico delivers secure networking for the cloud-native era, and 2019 has seen many major enhancements to the most deployed networking and network security solution for Kubernetes.

    From version 3.3 released in November of 2018 all the way through to 3.8 released earlier this July, Calico has advanced significantly with features that our community has requested and needed, such as:

    + IP address management (IPAM) features that make it more configurable and with support to assign a given IP pool to one or more Kubernetes namespaces
    + Features that give more control and allow much finer-grained dynamic IP management vs the static allocation of a fixed set of addresses to each node in native Kubernetes
    + Native support for VXLAN encapsulation
    + Optimized denial-of-service protection for host endpoints using XDP
    + Namespaced NetworkSets
    + And more...

    Join us for a technical webinar to learn more about these new features, with real-world examples of how, and why, you’d want to use them to improve the network security of your Kubernetes environment.
  • Why Can’t We Be Friends? – Kubernetes in a Zone-Based Architecture World Recorded: Jul 10 2019 33 mins
    Eddie Esquivel, Sr. Solutions Engineer with Tigera
    Since practically the beginning of data networks, Network and Security professionals have gravitated towards, and grown to love, Zone-Based network architectures.

    However, with the evolving landscape driven by microservices, containers, and Kubernetes, Zone-Based designs are being challenged to keep networks secure without creating an unreasonable amount of continuous configuration changes to firewalls.

    With this challenge, comes the opportunity to rethink how network security can be delivered more effectively and efficiently. The Cloud and Kubernetes offer a ton of flexibility but how do we achieve security, visibility, and compliance in these new areas.

    This technical webinar will dive into how Tigera can help us answer these challenges and more in the cloud landscape.
  • Kubernetes & Tigera: Network Policies, Security, and Auditing Recorded: Jun 19 2019 50 mins
    Drew Oetzel, Senior Technical Solutions Engineer with Tigera
    Of course, Tigera's ability to provide Kubernetes pod networking and facilitate service discovery is extremely valuable, but its real superpower is that both Tigera's commercial offerings and open-source Tigera Calico can implement network security policies inside a Kubernetes cluster.

    Most external network security operates at the perimeter or at the physical network layer of Kubernetes. Because Tigera runs inside Kubernetes, it can provide policy and security based on Kubernetes structures like namespaces and deployments.

    In this webinar, Senior Technical Solutions Engineer with Tigera, Drew Oetzel, will show you examples of implementing these types of policies for several common security and compliance use cases.

    He'll also show you why implementing these types of security policies is so important to keeping your ever-expanding Kubernetes workloads secure.
  • Meeting PCI DSS Network Security Requirements in Kubernetes Environments Recorded: Jun 5 2019 50 mins
    Vince Lau, CISSP, Director of Product Marketing at Tigera
    Compliance standards such as PCI DSS have assumed that traditional characteristics and behaviors of the development and delivery model would continue to be constant going forward. With the Container/Kubernetes revolution, that set of assumptions is no longer entirely correct. Attend this webinar and learn about what's changed, how those changes weaken your compliance and control environment, and what you can do to adjust to the new reality.
  • Extending Firewalls to Kubernetes to Not Break Existing Security Architectures Recorded: May 21 2019 42 mins
    Amit Gupta, VP of Product Management, Tigera
    Security teams use firewalls to secure their production environments, often using a zone-based architecture, and Kubernetes does not deploy well to that architecture. Application teams are launching new business-critical applications on Kubernetes and are aggressively moving to production. A clash is bound to happen.

    In this webinar, we will describe an approach to extend firewalls to Kubernetes that will accelerate deployment to production, save time & money, and preserve existing security processes and investments.
  • Securing Kubernetes Applications in Google Cloud with Tigera Recorded: Apr 17 2019 49 mins
    Amit Gupta, VP of Product Management, Tigera
    Calico was just recently embedded into Google GKE-On prem and we will demonstrate how to implement security controls on GKE. Don’t miss this webinar as we will be sharing some common network security challenges in the Kubrnetes environment. In addition, we will explore enterprise-grade Calico features provided in Tigera Secure which enables enterprises to add network security support in hybrid cloud environments with:

    + Network Flow Logs that record accepted and denied traffic, which policies denied the traffic, and workload context such as Kubernetes namespaces, labels, and metadata. Tigera Secure also provides dynamic graphical visualization of network flows.

    + Tiered policy controls with role-based access controls, to enable multiple teams to independently manage their respective security policies within the governance of the security team.

    + Anomaly Detection capabilities that provide insight into unusual behaviors and sophisticated attacks that compromise the security and performance of Kubernetes environments.
  • Istio Traffic Management - Best Practices in Secure Kubernetes Environments Recorded: Apr 3 2019 49 mins
    Christopher Liljenstolpe, CTO, Solutions, Tigera
    Istio’s traffic management decouples traffic flow and infrastructure scaling allowing you to specify what rules to govern traffic rather than which specific pods should receive traffic.

    In this webinar we'll discuss the following traffic management topics:
    · Discovery Load Balancing
    · Failure Handling
    · Fault Injection
  • Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection Recorded: Mar 20 2019 35 mins
    Christopher Liljenstolpe, CTO, Solutions, Tigera
    Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments. Anomaly Detection identifies outliers in Kubernetes clusters by building profiles of typical workloads and components to know when they start to deviate from the norm. It also manages network risk by continuously monitoring for activities such as reconnaissance scan, service connections anomaly, service bytes anomaly, and pod outlier activity detection.
  • Kubernetes & Zero Trust Security: Supporting a CARTA Approach Recorded: Mar 6 2019 31 mins
    Christopher Liljenstolpe, CTO, Solutions, Tigera
    Learn how to support a continuous adaptive risk and trust assessment (CARTA) approach leveraging accurate Kubernetes flow logs. 5-tuple logging is commonly used to monitor and detect anomalies and produces unreliable data that cannot accurately identify anomalies nor prove enforcement of security policies. Network flow logs include workload identity and other metadata that help continuously monitor activities within Kubernetes clusters.
Zero Trust Network Security & Compliance for Kubernetes Platforms
Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to secure containers and applications with a least privileges model and defense in depth. Tigera’s technology is recognized and trusted as the de facto standard for Kubernetes network security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Kubernetes: Anatomy of the Shopify Attack & How to Defend Your Infrastructure
  • Live at: Nov 7 2019 6:00 pm
  • Presented by: Garwood Pang, Security Researcher at Tigera
  • From:
Your email has been sent.
or close