Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
neop1x
on Aug 4, 2021
|
parent
|
context
|
favorite
| on:
NSA Kubernetes Hardening Guidance [pdf]
First you should configure some kind of authentication. It is fun to remember this 3 years old Tesla example [1]: Publicly accessible Kubernetes Dashboard.
[1]
https://www.zdnet.com/article/tesla-systems-used-by-hackers-...
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
[1] https://www.zdnet.com/article/tesla-systems-used-by-hackers-...