Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Securing your cloud assets requires continuous investment in keeping your containers safe. An infamous example of malconfigured Kubernetes has been Tesla's unsecured admin console for a Kubernetes cluster (https://www.wired.com/story/cryptojacking-tesla-amazon-cloud/Lessons from the Cryptojacking Attack at Tesla).  This led to malicious actors getting hold of credentials for Tesla's wider AWS environment who used it for cryptomining. Tesla highlighted that it was a test instance "only", but this incident shows why it's really important to secure both production and pre-production resources as far as possible. 

...