►
From YouTube: Optimizing breaking attack chains
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
An
attack
chain
is
a
series
of
misconfigurations
or
vulnerabilities
that
a
malicious
actor
can
exploit
to
access
and
manipulate
your
environment.
Now
this
is
often
referred
to
in
the
industry
as
attack
paths
and
I'll,
be
using
the
terms,
attack
chains
and
attack
paths
interchangeably
throughout
this
webinar.
But
I,
really
like
the
analogy
of
this
concept
as
a
chain
where
each
link
represents
some
exploitable
risk.
You
have
in
your
system
and
together
they
create
a
whole
chain
or
a
path.
A
A
Now,
let's
see
in
action
on
armo
platform
in
this
cluster,
we've
identified
two
attack
paths
that
correlate
to
the
two
types
of
attack
paths
we've
just
seen
in
this
first
one.
We
see
that
our
deployment
is
exposed
through
a
load.
Balancer
has
critical
vulnerabilities
on
its
image
and
has
three
different
risks
that
can
cause
further
impact,
like
the
fact
that
no
network
policy
is
applied
on
it.
A
Each
of
these
links
map
to
either
a
security
control
used
by
cubescape
misconfiguration
scanner
or
a
cve
identified
by
its
vulnerability
scanner.
You
may
already
be
aware
of
each
of
these
misconfigurations
and
cves,
but
attack
paths
put
them
into
context,
allowing
you
to
identify
those
that
have
the
most
impact.
A
A
A
So,
let's
we
can
use
this
fix
button
to
help
us
quickly
identify
where
and
how
to
fix
it.
These
lines
are
what
we
need
to
add
in
order
to
remediate
this
problem.
We
can
just
copy
this
yaml
or
download
it
as
a
file.
Now,
let's
open
our
favorite
text,
editor
paste
change.
These
values,
I'm
just
going
to
use
the
same
values
of
the
requests
for
the
limits
and
apply.
A
Amazing
there
we
are
that
simple
fix
fixing
one
control
for
one
resource
broke
in
attack
chain
just
goes
to
show
that
an
attack
chain
is
as
strong
as
its
weakest
link.
So
now
that
we've
learned
about
and
understood
this
cool
New
Concept,
what
can
we
do
with
it
now?
We
know
how
it
is
trying
to
maintain
a
secure
environment.
The
amount
of
work
is
overwhelming.
A
A
What
do
I
mean
by
that?
Our
misconfiguration
scans
and
our
image
scans?
They
spew
out
thousands
of
issues
we
need
to
take
care
of,
and
we
just
don't
have
the
time
to
fix
them
all.
So
we
use
tools
and
information
like
the
severity
of
each
risk
to
prioritize
our
work
and
that's
great,
but
attack
chains
or
attack
paths.
Take
this
a
step
further
because
we
won't
be
fixing
all
our
issues,
but
by
fixing
the
right
issue,
a
small
change
can
have
a
big
impact.
A
A
Attack
chains
can
provide
context
to
our
cves
and
our
misconfigurations
that
we
may
have
known
about
previously
and
didn't
know
we
should
prioritize
and
an
attack
chain
is
only
as
strong
as
its
weakest
link.
Thank
you
all.
So
much
for
joining
I
hope
this
helps
you
prioritize
your
efforts
and
Harden
your
security.