Container Breakouts – Part 1: Access to root directory of the Host

This post is part of a series and shows container breakout techniques that can be performed if a container is started with access to the host root directory. ...

July 15, 2020 · Jan Harrie

Verify your Kubernetes Cluster Network Policies: From Faith to Proof

Implement a technical check that verifies implemented security measurements. In case of network policy, try to establish a blocked network connection. Keep the checks as simple as possible and propagate the results in existing monitoring solution. ...

June 27, 2020 · Jan Harrie

Kubernetes Basics and Principles

This blogpost is intended to be a background knowledge section for further posts. The content is all around Kubernetes basic principles and reflects more a dictionary then a legitim blog post. The section itself may not explain every nuance of the topic – only as much as necessary as needed in other posts. ...

Jan Harrie