As Kubernetes clusters usually reside in the cloud, access to a container in the cluster can be a foothold to the entire cloud workload. In this session we will dive into Kubernetes lateral movements. We will elaborate on the different methods attackers can use to move from a workload in the cluster to external cloud resources. We will share practical tools to mitigate and detect those threats.