Análise de segurança do Kubernetes: vulnerabilidades, CVEs e exploração
Main Article Content
Abstract
Kubernetes is one of the most used container orchestrators of the world, being used to implement a microservices architecture. It offers various features, e.g., load balancer, Application Programming Interface (API) for control, scheduler, storage, etc. This amount of services increases the attack surface and good configuration becomes hard, so an attacker could exploit the cluster vulnerabilities. This article aims to analyze the main vulnerabilities of Kubernetes, performing an experiment demonstrating the impact that an attacker can do when exploiting components vulnerabilities on a cluster.
Article Details
Section
ERRC 2021
REABTIC reserves the right to make orthographic and grammatical changes to the original manuscripts in order to follow the culture standard of the language.
The published works become the property of REABTIC and it should be cited after the publication by using the respective source.
The opinions in the articles are the sole responsibility of the authors.