There’s no better way to understand container security than seeing some live hacking! This sessions explains and distinguishes the security concern of each layer in the container stack by actually exploiting each layer. We’ll take on Kubernetes itself, the Kubernetes configuration, the container engine (sandbox escaping), OS dependencies in your images, and of course your application dependencies. Each successful hack will help you better understand the mistakes you can make, their implications, and how you can avoid them.