Kubernetes and other established container technologies are here to stay. Most companies are either already making use of them, or are transitioning towards them. Unfortunately, many companies have little understanding of the full capabilities and the potential dangers of Kubernetes. This can lead to major vulnerabilities that attackers can take advantage of. In this session, we will demonstrate (live) how an application vulnerability can allow an attacker to take ownership of the entire Kubernetes cluster the application is running on. Moreover, the talk will provide a set of simple best practices that allow to prevent such attacks.
Get notified about new features and conference additions.