Container technologies enable you to build and scale applications more rapidly than ever before, but placing an application into a container doesn’t automatically make it secure. Applications can look and run as intended and still the components and configurations create new vulnerabilities and attack vectors that expose your application to potentially crippling security risks. We’re going to show you just how easy these vulnerabilities are to exploit!
In this live hacking session, we’ll exploit an application as an attacker would to showcase some of the most common container vulnerabilities and misconfigurations and how they expose your container application to a malicious actor. We’ll then show you clear remediation actions and best practices for each attack scenario. We'll also demonstrate how you can protect your application by automatically detecting container image vulnerabilities in registries like Amazon ECR and monitor Amazon EKS clusters for new vulnerabilities after deployment.
In this webinar, Snyk’s Clinton Herget, principal solutions architect, will demonstrate: