This guide will help security teams understand the attack surface for Kubernetes deployments and how vulnerabilities can be exploited by attackers. Real examples such as those used in Tesla and Jenkins crypto-mining exploits are provided.
A complete checklist of actions to secure the infrastructure and application containers in a Kubernetes deployment is provided.