Which way of defining security policy brings consistency, minimizes toil, and reduces the probability of misconfiguration?
Is it possible to restrict permissions so that a controller can only change the image of a deployment (without changing anything else about it, e.g., environment variables, commands, replicas, secrets)?
Which label should be added to the Namespace to block any privileged Pods from being created in that Namespace?
Which information does a user need to verify a signed container image?
On a client machine, what directory (by default) contains sensitive credential information?
A container running in a Kubernetes cluster has permission to modify host processes on the underlying node.
What combination of privileges and capabilities is most likely to have led to this privilege escalation?
How do Kubernetes namespaces impact the application of policies when using Pod Security Admission?
Which of the following statements on static Pods is true?
When should soft multitenancy be used over hard multitenancy?
Which security knowledge-base focuses specifically onoffensive tools, techniques, and procedures?