Abstract
The flexibility, modularity, and scalability of Kubernetes is ensuring that many new products are coming up with Kubernetes at their core. Kubernetes is also been supported by major cloud provides like Google GKE, Microsoft Azure AKS, and Amazon AWS EKS. However, careful though needs to be given to secure Kubernetes based deployments. In this presentation, I are going to explain the default behavior of Kubernetes clusters(from security perspective), various attack vectors to target a kubernetes cluster, how kubernetes networking can be targeted, how attackers are targeting Kubernetes installations both in premise and on the cloud, and how to protect Kubernetes from such attacks. I will explain things that should be considered before designing Kubernetes based applications. Lastly, I will also be comparing Kubernetes security provided by Google Microsoft, and Amazon.