Explore the vast landscape of Cloud Native security in this comprehensive conference talk. Break down the complex topic into three key areas: platform security, user management and permissions, and software supply chain. Learn about securing and upgrading control planes and nodes, isolating resources, managing privileges and secrets, authenticating and authorizing user access, leveraging RBAC and Namespaces, and understanding software supply chain threat models and mitigation strategies. Gain a stronger understanding of Cloud Native security's breadth and depth, and discover resources for further knowledge development. Delve into specific topics such as Ingress security, Kubernetes cluster upgrades, secret management, authentication methods, RBAC auditing, namespace vs. cluster-wide considerations, and attestation.