August 25
14:00–15:00
Kubernetes security: deception phase
The deception phase of information systems security is often unjustifiably neglected. Even though it can be used to provoke an intruder, who is trying to infiltrate your system or has already done so, to expose themselves and thereby detect them.
Can this be done in Kubernetes? Of course, yes, and often using its own built‑in mechanisms, which makes it much easier to create deception in a cluster.