August 25
Kubernetes security: deception phase
Track 1

The deception phase of information systems security is often unjustifiably neglected. Even though it can be used to provoke an intruder, who is trying to infiltrate your system or has already done so, to expose themselves and thereby detect them.

Can this be done in Kubernetes? Of course, yes, and often using its own built‑in mechanisms, which makes it much easier to create deception in a cluster.