The presentation discusses different attack scenarios on Kubernetes clusters and provides best practices for securing them.
- Overview of Kubernetes architecture and components
- Using K8s Threat Matrix and MITRE ATT&CK for Containers to demonstrate attack phases
- Best practices for securing Kubernetes clusters
- Anecdote about a vulnerable Drupal web application used for modeling attacks