Identity Impersonation in SPIFFE/SPIRE
Course
CyberArk's Eviatar Gerzi explores how attackers exploit SPIFFE/SPIRE trust assumptions to impersonate workloads and move laterally in Kubernetes environments, along with key defenses for zero trust systems.
In zero trust environments, machine identity is as critical as human identity. While SPIFFE and SPIRE are widely used for workload authentication in Kubernetes and cloud-native systems, their trust assumptions can be exploited in real-world conditions.
This session explores how attackers manipulate identity models - without breaking them - through techniques like selector spoofing, overlapping identities, and SVID/key extraction. Using the open-source tool Spooffe, Eviatar Gerzi, principal security researcher at CyberArk, will demonstrate how adversaries with privileged access can impersonate workloads and move laterally across clusters.
In this session, you will learn:
- Exploiting SPIFFE trust assumptions through selector spoofing and identity overlap;
- Leveraging privileged access to harvest SVIDs and enable lateral movement;
- Strengthening SPIRE deployments to defend against workload identity attacks.
Here is the course outline:
The Machine With Many Faces: Identity Impersonation in SPIFFE/SPIRE |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |
