Playing with Kubernetes Attack Vectors

To strengthen your security Kubernetes cluster and defend it effectively, you need to understand your adversary and take protective measures. Common misconfigurations and vulnerabilities in Kubernetes will be explored to identify common attack vectors and potential risks, such as RBAC bad practices, malicious containers, fileless execution, crypto-mining, and so on.



Carol Valencia

Software developer interested in best practices for securing cloud-native applications. Enthusiast and contributor of open-source projects, such as Kubernetes documentation. In my spare time, I like ...