Kubernetes is powerful – but unfortunately, it's also a godsend for hackers. How do attackers gain access to secrets? What happens if Role-Based Access Control (RBAC) is misconfigured? And how quickly can a namespace become a gateway for the entire company?
qSkills Kubernetes expert Thorsten Schifferdecker shows you the risks lurking in real-life Kubernetes setups – and how easily common security and compliance regulations (CIS, ISO 27001, GDPR) can be circumvented.
Learn how to effectively protect yourself with scanning, logging, and hardening – and what modern incident management in a cluster looks like.