Talk

How to Break and Protect K8s

  • In Russian
Presentation pdf

Let's look at the types of attacks on a cluster, what the main typical vulnerabilities are, how to deal with them, and what Admission Controller has to do with it. How to configure security policies so that you don't prohibit everything around and don't allow something unnecessary. Technologies: Kyverno, Kubernetes, network and network protocols, pentest.

  • #security
  • #Kyverno
  • #k8s
  • #network_protocols

Speakers

Invited experts

Schedule