By default, pods are not isolated.
This means that malicious actors once inside may wander freely throughout your kubernetes cluster.
During this session we’ll discuss the different attack vectors and how to mitigate.
– Intro to attacking kubernetes and applications
– Network policies, isolation and quarantining
– IDS and honeypots concepts
Get updates on blog posts, workshops, certification programs, new releases, and more!