Hack an K8s instance: Detect and mitigate vulnerabilities with the DevOps approach

People are under the impression that when you spin up the latest and greatest AKS, EKS, OpenShift or GKE instance, that you’re secure. However with K8S, now more than ever the workload underneath matters. One privileged, neglected, container can compromise an entire setup. Rather than just talking about the risks or best practices, this talk is all about showing how easy it is to do.

Speaker

scott-ford

Scott Ford


Scott Ford is a DevOps practitioner. In his current role as Principal Architect at Mondoo, he is focused on helping businesses automate security without adding friction to innovation. Prior to joining ...