Kubernetes continues to gain adoption. One sign of its rapid growth is that more than five million developers are using it. Many companies don’t yet have the most hardened clusters, particularly those in the early phases of their use. This session will demonstrate attacks on the DEF CON Kubernetes Capture the Flag (CTF) cluster, then teach attendees how to detect those attacks and defend against them.

Slides:

Attacking-and-Detecting-Attacks-on-Kubernetes-Clusters