To strengthen your security Kubernetes cluster and defend it effectively, you need to understand your adversary and take protective measures. Common misconfigurations and vulnerabilities in Kubernetes will be explored to identify common attack vectors and potential risks, such as RBAC bad practices, malicious containers, fileless execution, crypto-mining, and so on.