Protection from Container Malware with Anthos



  1. Bypass API Security
  2. Download, launch and run a script
  3. Add itself to cron job for persistence
  4. Lateral movement via SSH
  5. Command & Control
  6. Crypto mining

Protecting Container APIs

Protecting the Runtime

Protecting the Supply Chain

Ensuring Observability

Next Steps:




Cloud Security Engineer at Google Cloud

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

OraiDEX: Official launch with Liquidity Mining Program

Top 3 bug bounty platforms that are less crowded

Fl Studio Free No Virus

5 best password managers — how to securely organize your passwords

{UPDATE} 神経衰弱マニア Hack Free Resources Generator

White house Executive Order for Cyber Security requiring MFA and how LoginID can help…


Data Breach Troubles? 4 Steps You Should Take After One

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ryan Canty

Ryan Canty

Cloud Security Engineer at Google Cloud

More from Medium

Terraform Module for Kubernetes Cluster with Google Anthos

Jenkins Setup On Google Cloud Kubernetes Cluster

Deploy Jenkins Container on GCP Kubernetes Cluster

Create Kubernetes Controller using Rego and MetaController


How To Pass Certified Kubernetes Security Specialist (CKS)?