Welcome
Last updated
Last updated
The Cloud Threat Hunting Field Manual: Kubernetes is your essential companion for mastering proactive cybersecurity strategies within Kubernetes (K8s).
Whether you're new to cloud security or an experienced practitioner, this guide equips you with the knowledge and skills needed to safeguard K8s deployments against evolving cyber threats.
Learn about the fundamental components of a K8s cluster.
Understand how logging works inside a cluster.
Learn how to hunt within K8s.
Key security tools to secure and harden your K8s cluster.
References to CNCF and relevant documentation.
Section regarding IAC in context to K8s.