Certified Kubernetes Security Specialist (CKS) Study Guide by Benjamin Muschko

Certified Kubernetes Security Specialist (CKS) Study Guide by Benjamin Muschko

Author:Benjamin Muschko
Language: eng
Format: epub
Publisher: O'Reilly Media
Published: 2023-06-08T00:00:00+00:00


Scenario: An Attacker Gains Access to Another Container

In this scenario, we are confronted with a developer that pulls a container image from a public registry, as referenced by a Pod. The container has not been scanned for security vulnerabilities. An attacker can push a new tag of the container image executing malicious code. After instantiating a container from the image, the malicious code running in the kernel group of container 1 can access the process running in container 2. As you can see in Figure 5-4, both containers use the same kernel of the host system.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.