Watch a live demonstration of hacking and defending Kubernetes clusters in this conference talk. Explore common attacks and offensive techniques against Kubernetes clusters and workloads, along with runtime controls to protect against them. Witness scenarios including leveraging compromised containers, exploiting RBAC misconfigurations, and hijacking entire clusters. Learn how to contextualize attacks using threat model resources like the MITRE ATT&CK® Containers Matrix and CNCF Financial Services User Group attack trees. Gain insights on threat modeling, security testing, and defending your own Kubernetes clusters through practical examples and expert explanations.
Hacking and Defending Kubernetes Clusters - Live Demonstration