Posted on
in Presentations
As Kubernetes clusters usually reside in the cloud, access to a container in the cluster can be a foothold to the entire cloud workload. In this session we will dive into Kubernetes lateral movements. We will elaborate on the different methods attackers can use to move from a workload in the cluster to external cloud resources. We will share practical tools to mitigate and detect those threats.
Join the RSAC™ Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community