References
- Kubernetes Security - Best Practice Guide
- Attacking Kubernetes through Kubelet
- Hacking and Hardening Kubernetes Clusters by Example
- Securing Kubernetes Clusters by Eliminating Risky Permissions
- What Your Kubernetes Security Checklist Might Be Missing
- Setting Up Pod Security Policies
- Kubernetes Cheatsheet
- Hacking Kubelet on GKE
- Kubeletmein
- Hacking DigitalOcean Kubernetes Service
- Introducing Workload Identity: Better authentication for your GKE applications
- Tools and Methods for Auditing Kubernetes RBAC Policies
- Kubernetes Pentest Methodology Part 1
- Docker and Kubernetes Reverse shells
- Making it Rain shells in Kubernetes
- Kubernetes production best practices
- Using environment files over injected environment variables in Kubernetes
- How Kubernetes components communicate securely in your cluster
- Kubernetes Service Catalog 101
- Internal and external connectivity in Kubernetes space
- Kubernetes Pod Escape Using Log Mounts
- ConfigMaps in Kubernetes: how they work and what you should remember
- Calico for Kubernetes networking: the basics & examples
- GitDocs
- Getting Started with Kubernetes - etcd
- CRD is just a table in Kubernetes
- Kubernetes Networking Demystified: A Brief Guide
- Hello World
- Learn Kubernetes in Under 3 Hours: A Detailed Guide to Orchestrating Containers