Offensive K8s Security 101

Container orchestration has been the driver for velocious software development and reliability engineering. But how to ensure the secure operation of your apps in a Kubernetes (K8s) cluster? In this workshop we take the perspective of a security auditor and attacker to attack and defend a shared Kubernetes cluster together.

Container, microservices, Kubernetes, GitOps - all those terms dominate the modern software development teams and processes. In the first part of this course, you learn the technological basics behind all those terms. In the second part, you take the perspective of a security auditor and finally of an attacker and learn to attack and defend a shared Kubernetes cluster. Among others, you will gain answers for the following questions:

  • How to audit the security of a Kubernetes cluster?
  • What are the most common security pitfalls in (managed) Kubernetes clusters?
  • How to compromise a Kubernetes cluster?

All topics are guided by and demonstrated with practical hands-on exercises in a shared K3s Kubernetes cluster (in Hetzner Cloud). At the end of this workshop the participants will have gained in-depth knowledge about the hardening and attacking of Kubernetes clusters and the impact of misconfigurations for deployed application architectures and the operation of a modern microservice infrastructure. The workshop ends with an attack and defense game where the participants attack other participants and defend themselves by applying their knowledge learned along the way.

About the Speakers