Container Breakouts – Part 1: Access to root directory of the Host
This post is part of a series and shows container breakout techniques that can be performed if a container is started with access to the host root directory. ...
This post is part of a series and shows container breakout techniques that can be performed if a container is started with access to the host root directory. ...
Implement a technical check that verifies implemented security measurements. In case of network policy, try to establish a blocked network connection. Keep the checks as simple as possible and propagate the results in existing monitoring solution. ...
This blogpost is intended to be a background knowledge section for further posts. The content is all around Kubernetes basic principles and reflects more a dictionary then a legitim blog post. The section itself may not explain every nuance of the topic – only as much as necessary as needed in other posts. ...