A Pentester’s Approach to Kubernetes Security — Part 2
Part 2 of Appsecco's Kubernetes pentest series, focusing on overprivileged RBAC, cloud IAM to Kubernetes mappings, and how attackers escape from cluster to cloud.
Type to search across all pages
Container orchestration expands the attack surface. We test K8s clusters the way real attackers approach them — from RBAC to pod escapes.
4 articles
Part 2 of Appsecco's Kubernetes pentest series, focusing on overprivileged RBAC, cloud IAM to Kubernetes mappings, and how attackers escape from cluster to cloud.
A practical rundown of the most common Kubernetes misconfigurations found during real pentests, covering network policy gaps, exposed API proxies, and service account privilege issues.
A transparent pentest post-mortem: how Appsecco attacked a well-architected AWS EKS product, what attack paths were tried, and which security design decisions stopped them cold.
Slides, video, and Q&A from an OWASP Bay Area webinar on attacking Kubernetes clusters, with live demonstrations on a GKE cluster covering namespace breakouts and host path exploits.
Want to know how we test for these issues in your product?
Get a Security Assessment