Posted on
in Presentations
Understanding Kubernetes attacks and mitigations can be overwhelming as workloads move to the cloud. Join this Learning Lab to gain hands-on experience using stolen Kubernetes credentials to compromise a pod, escape the node, and pivot to cloud resources. After a post-mortem, use blue team skills to write policy as code, harden the cluster, and prevent the incident from happening again.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community