Kubernetes Security - Intrusion Detection and Mitigation
By default, pods are not isolated.
This means that malicious actors once inside may wander freely throughout your kubernetes cluster.
During this session we’ll discuss the different attack vectors and how to mitigate.
Intro to attacking kubernetes and applications
Network policies, isolation and quarantining
IDS and honeypots concepts