New report - State of Kubernetes Security Fall 2020 - Get your copy today Download Report
{ .link_text }}

Posts under Kubernetes Risk

Protecting Against Kubernetes Threats: Chapter 7 - Discovery

Protecting Against Kubernetes Threats: Chapter 7 - Discovery

Part seven of our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – examines the technique known as Discovery. The tactics in this category are intended to help an attacker effectively explore a Kubernetes environment to achieve lateral movement and gain access to a wider scope of resources with or beyond the cluster. They include ways to gain access to the Kubernetes API server or the Kubelet API, map the cluster network, or compromise resources via the Kubernetes Dashboard or cloud instance metadata.