Page cover

Welcome

The Cloud Threat Hunting Field Manual: Kubernetes is your essential companion for mastering proactive cybersecurity strategies within Kubernetes (K8s).

Whether you're new to cloud security or an experienced practitioner, this guide equips you with the knowledge and skills needed to safeguard K8s deployments against evolving cyber threats.

Jump Right In

Cover

Learn about the fundamental components of a K8s cluster.

Cover

Understand how logging works inside a cluster.

Cover

Learn how to hunt within K8s.

Cover

Key security tools to secure and harden your K8s cluster.

Cover

References to CNCF and relevant documentation.

Cover

Section regarding IAC in context to K8s.

Last updated