RESOURCE CENTER

Penetrating Kubernetes 101

 

This whitepaper discusses the risks associated with Kubernetes and provides a methodology for pentesters, whether they are engaging in white-, black- or gray-box testing. The paper is built around the three key vectors pentesters should check first including risky privileges in the role-based access control (RBAC) configuration, attacking the Kubernetes cluster remotely and insider attacks.


Register to Download

 

STAY IN TOUCH

STAY IN TOUCH!

Keep up-to-date on security best practices, events and webinars.

Share This