Compromised Sidecars
How attackers exploit insecure or malicious sidecar containers to intercept data, escalate privileges, and persist within Kubernetes clusters.
How attackers exploit insecure or malicious sidecar containers to intercept data, escalate privileges, and persist within Kubernetes clusters.
How an attacker can break out of a container and gain control over the host system in Kubernetes.
How attackers exploit Kubernetes default group merging behavior to inject unauthorized supplemental group IDs from container images into running pod processes.
How to use supplementalGroupsPolicy: Strict to prevent container images from injecting unauthorized supplemental group IDs into Kubernetes pod processes.
How to configure Linux capabilities in Kubernetes pod security contexts to prevent privilege escalation and reduce the container attack surface.
How attackers abuse kubectl debug and ephemeral containers to inject debugging tools, access process namespaces, and compromise Kubernetes workloads.
kube-psp-advisor generates Pod Security Policies and Pod Security Standards based on the actual security requirements of running workloads.
Learn how Kubernetes Pod Security Standards (PSS) enforce security controls for workloads and replace the deprecated Pod Security Policies (PSP).
Why the gitRepo volume driver was removed in Kubernetes v1.36, and how to migrate existing workloads to the init container pattern recommended by kubernetes.io.
How to control ephemeral container and kubectl debug access through RBAC, Pod Security Standards, and admission control in Kubernetes.
How to protect Kubernetes PersistentVolumes from unauthorized access, data exposure, and cross-namespace attacks through proper configuration and RBAC.
How to safely configure kernel parameters via sysctls in Kubernetes pods, distinguish safe from unsafe sysctls, and enforce restrictions using Pod Security Standards.
How attackers exploit unrestricted hostPath mounts to gain access to the host filesystem and escalate privileges.
How to use Linux user namespaces in Kubernetes pods to isolate container UIDs from the host and reduce the blast radius of container escapes.