Skip to content

Latest commit

 

History

History
66 lines (53 loc) · 5.23 KB

File metadata and controls

66 lines (53 loc) · 5.23 KB

⚠️ AWS ECR & EKS Security Masterclass - From Exploitation to Defense ⚠️

Authored by Anjali Shukla & Divyanshu Shukla for kubernetesvillage community.

Workshop Overview

The AWS EKS Red Team Masterclass - From Exploitation to Defense is an immersive workshop designed to take participants through real-world scenarios of attacking and defending Kubernetes clusters hosted on AWS EKS.

This workshop provides a comprehensive approach, from understanding the anatomy of attacks on EKS clusters to deploying robust defense mechanisms. Participants will learn how to exploit misconfigurations and vulnerabilities within AWS EKS, followed by the implementation of best security practices to safeguard the environment. Key Takeaways:

  • Hands-on labs focused on exploiting EKS misconfigurations.
  • Techniques for lateral movement, privilege escalation, and post-exploitation in AWS EKS.
  • Deep dive into securing AWS EKS clusters by leveraging IAM roles, Kubernetes RBAC, and network policies.
  • Best practices for automating vulnerability detection and defense mechanisms in AWS EKS environments.

This workshop is tailored for security professionals, cloud engineers, and DevOps teams looking to enhance their understanding of offensive and defensive Kubernetes security strategies.

🚀 Prerequisites for EKS Security Workshop 🚀

  • ❗ Gmail Account
    • Gmail account to access the documentation.
  • 🔧 GitHub Codespace Setup
    • Set up GitHub for Codespace so that the lab can be configured & deployed.
  • 🔑 Bring Your Own AWS Account
    • Participants are required to bring an AWS account with billing enabled and admin privileges.
  • 💻 Laptop with Browser
    • Laptop with an updated browser (Administrative Privileges if required).

Credits

Reach out in case of missing credits.