Posted on
in Presentations
As Kubernetes clusters usually reside in the cloud, access to a container in the cluster can be a foothold to the entire cloud workload. In this session we will dive into Kubernetes lateral movements. We will elaborate on the different methods attackers can use to move from a workload in the cluster to external cloud resources. We will share practical tools to mitigate and detect those threats.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community