
Kubernetes Pen Testing, with Jesper Larsson
Kubernetes Podcast from Google
Securing Kubernetes and Infrastructure as Code
This chapter discusses the importance of security in Kubernetes and infrastructure as code, highlighting vulnerabilities and best practices. The speakers cover topics such as access permissions, web application vulnerabilities, pen testing experiences, exploiting vulnerabilities in user configurations, and the challenges of implementing Kubernetes security measures. They also touch on the complexities of modern infrastructure, the concept of zero trust, risk assessment, the decentralized nature of infrastructure, and common mistakes to avoid.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.