What supply chain risks are hidden in your Helm charts?
Helm charts simplify Kubernetes deployments but pose security risks. This hands-on workshop covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
Helm is the go-to package manager for Kubernetes. It simplifies deployments but introduces security risks. Misconfigured charts, unverified dependencies, and lax RBAC settings can lead to supply chain attacks. As Kubernetes adoption grows, these challenges increase.
Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. Attendees will be provided with access to an interactive Instruqt lab environment that examines real-world threats and demonstrates how to scan for vulnerabilities using open-source tooling, enforce security best practices, and correctly sign and verify our Helm charts before they go into production Kubernetes.
Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. Attendees will be provided with access to an interactive Instruqt lab environment that examines real-world threats and demonstrates how to scan for vulnerabilities using open-source tooling, enforce security best practices, and correctly sign and verify our Helm charts before they go into production Kubernetes.
What supply chain risks are hidden in your Helm charts?
Helm charts simplify Kubernetes deployments but pose security risks. This hands-on workshop covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
Panelist

Panelist

Panelist

Moderator

Nigel Douglas
Head of Developer Relations, Cloudsmith
Helm is the go-to package manager for Kubernetes. It simplifies deployments but introduces security risks. Misconfigured charts, unverified dependencies, and lax RBAC settings can lead to supply chain attacks. As Kubernetes adoption grows, these challenges increase.
Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. Attendees will be provided with access to an interactive Instruqt lab environment that examines real-world threats and demonstrates how to scan for vulnerabilities using open-source tooling, enforce security best practices, and correctly sign and verify our Helm charts before they go into production Kubernetes.
Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. Attendees will be provided with access to an interactive Instruqt lab environment that examines real-world threats and demonstrates how to scan for vulnerabilities using open-source tooling, enforce security best practices, and correctly sign and verify our Helm charts before they go into production Kubernetes.
What supply chain risks are hidden in your Helm charts?
Helm charts simplify Kubernetes deployments but pose security risks. This hands-on workshop covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
Helm is the go-to package manager for Kubernetes. It simplifies deployments but introduces security risks. Misconfigured charts, unverified dependencies, and lax RBAC settings can lead to supply chain attacks. As Kubernetes adoption grows, these challenges increase.
Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. Attendees will be provided with access to an interactive Instruqt lab environment that examines real-world threats and demonstrates how to scan for vulnerabilities using open-source tooling, enforce security best practices, and correctly sign and verify our Helm charts before they go into production Kubernetes.
Organizations using Amazon EKS, Google GKE, or self-managed clusters must secure their Helm charts to prevent privilege escalation and data exfiltration. Attendees will be provided with access to an interactive Instruqt lab environment that examines real-world threats and demonstrates how to scan for vulnerabilities using open-source tooling, enforce security best practices, and correctly sign and verify our Helm charts before they go into production Kubernetes.
What supply chain risks are hidden in your Helm charts?
Helm charts simplify Kubernetes deployments but pose security risks. This hands-on workshop covers vulnerabilities, attack scenarios, and best practices for securing Helm charts, ensuring supply chain security and compliance.
Panelist

Panelist

Panelist

Host

Nigel Douglas
Head of Developer Relations, Cloudsmith
Sign up now

