This lesson is for subscribers
You've completed the free preview. Subscribe to unlock every lesson in every course.
Identifying dangerous permissions like create pods, impersonate, and bind that can lead to cluster compromise.
You've completed the free preview. Subscribe to unlock every lesson in every course.