Using Kubernetes? Here’s an interesting research series from CyberArk Labs through the eyes of a black-box pen tester:
A look at risks that come from misconfiguring the Kubernetes Role-Based Access Control (RBAC) + attack vectors that could lead to privilege escalation:
https://www.cyberark.com/threat-research-blog/kubernetes-pentest-methodology-part-1/
Attacking the Kubernetes cluster remotely and defending against API server attacks:
https://www.cyberark.com/threat-research-blog/kubernetes-pentest-methodology-part-2/