1 link tagged with all of: kubernetes + attack-simulation + security + detection-rules
Click any tag below to further narrow down your results
Links
This repository offers a set of Falco detection rules and configuration files aimed at identifying various Kubernetes attack techniques. It includes scripts for testing these detections by simulating attacker behavior in a controlled environment.