By default, pods are not isolated.
This means that malicious actors once inside may wander freely throughout your kubernetes cluster.
During this session we’ll discuss the different attack vectors and how to mitigate.
– Intro to attacking kubernetes and applications
– Network policies, isolation and quarantining
– IDS and honeypots concepts