Kubernetes is a powerful and highly configurable tool, but by default it’s extremely insecure. In this live hacking session, I’ll show how an attacker can expand the blast radius of an application exploit through to control of the entire cluster whilst demonstrating the misconfigurations which allow this to occur and showing how you can avoid these scenarios in the real world.
DevSecOps strategy for developer
About Timo Pagel
After a career as a system administrator and web developer, he advises customers as a DevSecOps consultant and trainer. His focus is on security test automation for software and infrastructure and assessment of complex applications in the cloud.