Kubernetes Pentest Methodologies

Using Kubernetes? Here’s an interesting research series from CyberArk Labs through the eyes of a black-box pen tester:

A look at risks that come from misconfiguring the Kubernetes Role-Based Access Control (RBAC) + attack vectors that could lead to privilege escalation:
https://www.cyberark.com/threat-research-blog/kubernetes-pentest-methodology-part-1/

Attacking the Kubernetes cluster remotely and defending against API server attacks:
https://www.cyberark.com/threat-research-blog/kubernetes-pentest-methodology-part-2/

2 Likes

I’ve found that combining those methods with Aqua Security’s open source tools kube-hunter and kube-bench really round out a complete picture of a Kubernetes cluster’s potential attack vectors and weaknesses.

3 Likes