In this session, we will briefly go over Kubernetes components and their roles. Then, we will delve into the realm of security and examine how the default configurations of these components could be used to attack your environment and how a zero-trust posture can help against the attacks that are targeting your clusters. By the end of this session, attendees will be able to: