How can a tiny vulnerability in a web application lead to to a take over of your complete Kubernetes cluster and cloud provider account? In this talk, I'll show you on a live system, how a hacker could end up doing exactly that. You will learn about different attack vectors, and how you can protect yourself against each one of them with a multi-layered security strategy. And all of this with the help of open-source tools.
To provide the best experiences, the usage of cookies are necessary. Some are essential for the proper functioning of the site, while others help us better cater to your interests.