Azure Kubernetes Service (AKS) Threat Hunting

Microsoft Security Header
As more businesses shift away from running workloads on dedicated virtual machines to running them inside containers using workload orchestrators like Kubernetes, adversaries have become more interested in them as targets. Moreover, the benefits Kubernetes provides for managing workloads are also extended to adversaries. As adversaries leverage Kubernetes to run their workloads, their understanding of how these platforms work and can be exploited increases.

Source – Microsoft Security Response Center

All content and images belong to their respected owners, this article is curated for informational purposes only.

Previous Post
Microsoft Security Header

Configuring host-level audit logging for AKS VMSS

Next Post
citrix logo header

Citrix Cloud Connector Installation does not complete: Unable to validate certificate chain

Related Posts