Download pdf
Attackers are increasingly targeting Kubernetes clusters to compromise applications or abuse resources for things like crypto-coin mining. Through live demos, this research-based session will show attendees how. Eviatar Gerzi, who researches DevOps security, will also introduce an open source tool designed to help blue and red teams discover and eliminate risky permissions.

Pre-Requisites: Basic experience with Kubernetes and familiarity with docker containers.