In the security world, one of the most established methods to identify that a system was compromised, abused or mis-configured is to collect logs of all the activity performed by the system’s users and automated services and to analyze these logs – Kubernetes API Server audit subsystem is exactly that. In an era where operators, controllers. in-cluster components as well as external components are what application made from – having a practice around this security data source becomes a must.
Join this session to learn about how Kubernetes Audit log can be utilized to enhance the security of Kubernetes based deployments.