{"id":24,"date":"2024-01-08T11:04:22","date_gmt":"2024-01-08T10:04:22","guid":{"rendered":"https:\/\/laokoon-security.com\/?page_id=24"},"modified":"2024-11-27T12:50:04","modified_gmt":"2024-11-27T11:50:04","slug":"kubernetes-pentest","status":"publish","type":"page","link":"https:\/\/laokoon-security.com\/en\/service\/kubernetes-pentest\/","title":{"rendered":"Kubernetes penetration test"},"content":{"rendered":"<div class=\"wp-block-columns are-vertically-aligned-center alignwide hero-section-v1 has-lk-gradient has-background is-layout-flex wp-container-core-columns-is-layout-4ab3942d wp-block-columns-is-layout-flex\" style=\"background:linear-gradient(149deg,rgb(21,54,73) 29%,rgb(109,128,140) 100%);padding-top:170px;padding-right:0px;padding-bottom:60px;padding-left:0px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center hero-divs-holder is-layout-flex wp-container-core-columns-is-layout-35b47e0a wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:45%\">\n<p class=\"fade-up has-primary-color has-text-color has-link-color wp-elements-5a113d0163392ab605469d5ebefca1e9\"><strong>Kubernetes penetration test<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading fade-up has-contrast-color has-text-color has-link-color has-large-font-size wp-elements-23d6c9749d591ca881231b05652a938c\" style=\"font-style:normal;font-weight:600\">From containers to clusters: holistic security<\/h1>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Configure PenTest<\/a><\/div>\n\n\n\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link has-contrast-color has-text-color has-background has-link-color has-border-color has-primary-border-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/contact\/\" style=\"border-width:2px;background-color:#ffffff00\">Get advice<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-kubernetes.svg\" alt=\"Kubernetes penetration test\" class=\"wp-image-460\" style=\"width:398px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-e5780d3d wp-block-group-is-layout-flex\" style=\"margin-top:100px;margin-bottom:150px;padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group contentbox-main-container wp-container-content-663c14dd is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-a687b86e wp-block-group-is-layout-flex\" style=\"padding-right:60px\">\n<div class=\"wp-block-group wp-container-content-958eb9dc is-horizontal is-layout-flex wp-container-core-group-is-layout-c21e46d5 wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-1393db22 wp-block-group-is-layout-flex\" style=\"margin-top:0px;margin-bottom:0px\">\n<h2 class=\"wp-block-heading\">Kubernetes penetration test<\/h2>\n\n\n\n<p>The containerisation of applications or even entire infrastructures is picking up speed and simplifying the management of complex use cases.<\/p>\n\n\n\n<p>Although the complexity of administration is reduced, security gaps can creep into the container setup due to ignorance, lack of experience or incorrect use, enabling attackers to compromise entire clusters or gain access to sensitive data.<\/p>\n\n\n\n<p>In a Kubernetes penetration test, we check the individual containers, the cluster and the interaction as a whole for security vulnerabilities.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-1393db22 wp-block-group-is-layout-flex\" style=\"margin-top:0px;margin-bottom:0px\">\n<h3 class=\"wp-block-heading\">K8s - The original<\/h3>\n\n\n\n<p>K8s is short for Kubernetes. Kubernetes is an open source platform for managing container-based applications that is frequently used in the cloud. It was originally developed by Google and is now one of the most frequently used tools for deploying and managing applications in the cloud.<\/p>\n\n\n\n<p>Kubernetes makes it possible to package applications in containers that can then be executed on different hosts. The containers are managed by Kubernetes to ensure that they are executed when they are needed and are provided with the required resources. Kubernetes also offers functions for scaling applications, deploying application updates and managing application dependencies.<\/p>\n\n\n\n<p>A key benefit of Kubernetes is its ability to run and manage applications on multiple hosts, making it an attractive option for organisations looking to deploy their applications in the cloud. It is also a good choice for organisations that choose to use container technologies, as it simplifies the management of containers.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<h2 class=\"wp-block-heading\">K3s - The lightweight<\/h2>\n\n\n\n<p>K3s is a lightweight implementation of Kubernetes designed specifically for use in resource-constrained environments such as edge computing scenarios or on smaller servers. It was developed by Rancher Labs and offers many of the same features as Kubernetes, but with a reduced feature set and number of dependencies, making it a faster and simpler alternative.<\/p>\n\n\n\n<p>K3s is particularly useful for organisations looking to deploy Kubernetes in resource-constrained environments, such as edge computing infrastructure or smaller servers. It is also a good choice for organisations that choose to use container technologies, as it provides an easy way to manage and orchestrate containers. K3s is also easy to install and use, making it attractive for newcomers to the container world.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-flex wp-container-core-group-is-layout-938f3215 wp-block-group-is-layout-flex\" style=\"margin-top:60px\">\n<div class=\"wp-block-group unfold-element wp-container-content-958eb9dc is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-5adf0b57 wp-block-group-is-layout-flex\" style=\"border-bottom-width:2px;padding-bottom:40px\">\n<div class=\"wp-block-group unfold-title is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading wp-container-content-68ac353a\">Black Box - Little to no information<\/h6>\n\n\n\n<figure class=\"wp-block-image size-full unfold-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-plus.svg\" alt=\"\" class=\"wp-image-395\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group unfold-content is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-9366075c wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group wp-container-content-958eb9dc is-nowrap is-layout-flex wp-container-core-group-is-layout-c0d58a60 wp-block-group-is-layout-flex\" style=\"padding-top:25px;padding-bottom:0px\">\n<p>No additional information is available for the penetration test of the cluster or individual containers.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group unfold-element wp-container-content-958eb9dc is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-5adf0b57 wp-block-group-is-layout-flex\" style=\"border-bottom-width:2px;padding-bottom:40px\">\n<div class=\"wp-block-group unfold-title is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading wp-container-content-68ac353a\">Grey Box - Additional initial information<\/h6>\n\n\n\n<figure class=\"wp-block-image size-full unfold-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-plus.svg\" alt=\"\" class=\"wp-image-395\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group unfold-content is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-9366075c wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group wp-container-content-958eb9dc is-nowrap is-layout-flex wp-container-core-group-is-layout-c0d58a60 wp-block-group-is-layout-flex\" style=\"padding-top:25px;padding-bottom:0px\">\n<p>Access to different users who have different levels of authorisation. This allows us to check more quickly whether endpoints can be accessed by low-privileged users that should be reserved for higher-privileged users.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group unfold-element wp-container-content-958eb9dc is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-5adf0b57 wp-block-group-is-layout-flex\" style=\"border-bottom-width:2px;padding-bottom:40px\">\n<div class=\"wp-block-group unfold-title is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-cb46ffcb wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading wp-container-content-68ac353a\">White Box - Comprehensive information and access to the cluster<\/h6>\n\n\n\n<figure class=\"wp-block-image size-full unfold-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-plus.svg\" alt=\"\" class=\"wp-image-395\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group unfold-content is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-9366075c wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group wp-container-content-958eb9dc is-nowrap is-layout-flex wp-container-core-group-is-layout-c0d58a60 wp-block-group-is-layout-flex\" style=\"padding-top:25px;padding-bottom:0px\">\n<p>The most effective approach: We have access to different users with different rights, as well as to parts of the source code and the logs. This allows us to gain a comprehensive picture of the application's security.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group sticky-cta-box has-contrast-background-color has-background wp-container-content-2f62e668 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-7e91b5de wp-block-group-is-layout-flex wp-container-1 is-position-sticky\" style=\"border-radius:10px;margin-top:30px;padding-top:35px;padding-right:35px;padding-bottom:35px;padding-left:35px\">\n<h6 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-d79dc27297dbd25663e4edc9405234f4\">When does a Kubernetes PenTest make sense for my company?<\/h6>\n\n\n\n<ul class=\"wp-block-list checklist has-base-color has-text-color has-link-color wp-elements-0d0676fb7020ec049ed956e83e2f2909\">\n<li>You develop extensive Kubernetes clusters.<\/li>\n\n\n\n<li>Alternatively, you can use extensive Kubernetes clusters productively.<\/li>\n\n\n\n<li>You want to know whether attackers can exploit misconfigurations or vulnerabilities in the containers.<\/li>\n\n\n\n<li>They want to secure their clusters in a targeted manner.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:25px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Start PenTest now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"cta\" class=\"wp-block-group alignwide has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-2a962c2a wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:0px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-8820e02c wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group cta-footer-content wp-container-content-2f62e668 is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h3 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Secure your IT now!<\/h3>\n\n\n\n<ul class=\"checklist has-contrast-color has-text-color has-link-color wp-block-list wp-elements-94d378b02289daa3b1444a4f5402d6a8 wp-container-content-958eb9dc\">\n<li class=\"fade-up\">Extensive experience in the field of offensive security<\/li>\n\n\n\n<li class=\"fade-up\">Broad experience in the team<\/li>\n\n\n\n<li class=\"fade-up\">Highly secure solutions that do not open new doors for attackers<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group cta-footer-form has-contrast-background-color has-background wp-container-content-4fb2e66a is-layout-flex wp-container-core-group-is-layout-03c12fd1 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1323 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1323\" data-uid=\"69dc3c0dc7a7b\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1323\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1323 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1323\"\n\t\t\t\t data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69dc3c0dc7a7b\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-0\"\n\t\t\t\tclass=\"forminator-pagination forminator-pagination-start\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-0-label\"\n\t\t\t\tdata-step=\"0\"\n\t\t\t\tdata-label=\"Finish\"\n\t\t\t\tdata-actual-label=\"Page 1\"\n\t\t\t\tdata-name=\"page-break-1\"\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"html-1\" class=\"forminator-field-html forminator-col forminator-col-12\"><div class=\"forminator-field forminator-merge-tags\" data-field=\"html-1\"><h4 class=\"has-base-color\">Order a Kubernetes penetration test now!<\/h4><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"checkbox-1\" class=\"forminator-field-checkbox forminator-col forminator-col-12\"><div role=\"group\" class=\"forminator-field required\" aria-labelledby=\"forminator-checkbox-group-forminator-field-checkbox-1-69dc3c0dc7a7b-label\"><span id=\"forminator-checkbox-group-forminator-field-checkbox-1-69dc3c0dc7a7b-label\" class=\"forminator-label\">What type of penetration test should be carried out? <span class=\"forminator-required\">*<\/span><\/span><label id=\"forminator-field-checkbox-1-1-69dc3c0dc7a7b-label\" for=\"forminator-field-checkbox-1-1-69dc3c0dc7a7b\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Web application (full stack)\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Web\" id=\"forminator-field-checkbox-1-1-69dc3c0dc7a7b\" aria-labelledby=\"forminator-field-checkbox-1-1-69dc3c0dc7a7b-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Web application (full stack)<\/span><\/label><label id=\"forminator-field-checkbox-1-2-69dc3c0dc7a7b-label\" for=\"forminator-field-checkbox-1-2-69dc3c0dc7a7b\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"API\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"api\" id=\"forminator-field-checkbox-1-2-69dc3c0dc7a7b\" aria-labelledby=\"forminator-field-checkbox-1-2-69dc3c0dc7a7b-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">API<\/span><\/label><label id=\"forminator-field-checkbox-1-3-69dc3c0dc7a7b-label\" for=\"forminator-field-checkbox-1-3-69dc3c0dc7a7b\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"OT device\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"OT-Geraet\" id=\"forminator-field-checkbox-1-3-69dc3c0dc7a7b\" aria-labelledby=\"forminator-field-checkbox-1-3-69dc3c0dc7a7b-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">OT device<\/span><\/label><label id=\"forminator-field-checkbox-1-4-69dc3c0dc7a7b-label\" for=\"forminator-field-checkbox-1-4-69dc3c0dc7a7b\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"OT network\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"OT-Netz\" id=\"forminator-field-checkbox-1-4-69dc3c0dc7a7b\" aria-labelledby=\"forminator-field-checkbox-1-4-69dc3c0dc7a7b-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">OT network<\/span><\/label><label id=\"forminator-field-checkbox-1-5-69dc3c0dc7a7b-label\" for=\"forminator-field-checkbox-1-5-69dc3c0dc7a7b\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Corporate network\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Unternehmensnetz\" id=\"forminator-field-checkbox-1-5-69dc3c0dc7a7b\" aria-labelledby=\"forminator-field-checkbox-1-5-69dc3c0dc7a7b-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Corporate network<\/span><\/label><label id=\"forminator-field-checkbox-1-6-69dc3c0dc7a7b-label\" for=\"forminator-field-checkbox-1-6-69dc3c0dc7a7b\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Kubernetes\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Kubernetes\" id=\"forminator-field-checkbox-1-6-69dc3c0dc7a7b\" aria-labelledby=\"forminator-field-checkbox-1-6-69dc3c0dc7a7b-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Kubernetes<\/span><\/label><label id=\"forminator-field-checkbox-1-7-69dc3c0dc7a7b-label\" for=\"forminator-field-checkbox-1-7-69dc3c0dc7a7b\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"IoT device\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"IoT\" id=\"forminator-field-checkbox-1-7-69dc3c0dc7a7b\" aria-labelledby=\"forminator-field-checkbox-1-7-69dc3c0dc7a7b-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">IoT device<\/span><\/label><label id=\"forminator-field-checkbox-1-8-69dc3c0dc7a7b-label\" for=\"forminator-field-checkbox-1-8-69dc3c0dc7a7b\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"ActiveDirectory\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"AD\" id=\"forminator-field-checkbox-1-8-69dc3c0dc7a7b\" aria-labelledby=\"forminator-field-checkbox-1-8-69dc3c0dc7a7b-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">ActiveDirectory<\/span><\/label><label id=\"forminator-field-checkbox-1-9-69dc3c0dc7a7b-label\" for=\"forminator-field-checkbox-1-9-69dc3c0dc7a7b\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Cloud application and infrastructure\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Cloud\" id=\"forminator-field-checkbox-1-9-69dc3c0dc7a7b\" aria-labelledby=\"forminator-field-checkbox-1-9-69dc3c0dc7a7b-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Cloud application and infrastructure<\/span><\/label><label id=\"forminator-field-checkbox-1-10-69dc3c0dc7a7b-label\" for=\"forminator-field-checkbox-1-10-69dc3c0dc7a7b\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Infrastructure-as-Code\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"IaC\" id=\"forminator-field-checkbox-1-10-69dc3c0dc7a7b\" aria-labelledby=\"forminator-field-checkbox-1-10-69dc3c0dc7a7b-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Infrastructure-as-Code<\/span><\/label><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-1\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-1-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"1\"\n\t\t\t\tdata-label=\"Page  1\"\n\t\t\t\tdata-actual-label=\"Page 2\"\n\t\t\t\tdata-name=\"page-break-3\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-1\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1323__field--select-1_69dc3c0dc7a7b\" id=\"forminator-form-1323__field--select-1_69dc3c0dc7a7b-label\" class=\"forminator-label\">Has a penetration test already been carried out?<\/label><select  id=\"forminator-form-1323__field--select-1_69dc3c0dc7a7b\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-1\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1323__field--select-1_69dc3c0dc7a7b-label\"><option value=\"yes\"  data-calculation=\"0\">Yes<\/option><option value=\"no\"  data-calculation=\"0\">No<\/option><\/select><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-2\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-2-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"2\"\n\t\t\t\tdata-label=\"Page  2\"\n\t\t\t\tdata-actual-label=\"Page 3\"\n\t\t\t\tdata-name=\"page-break-2\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-2\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1323__field--select-2_69dc3c0dc7a7b\" id=\"forminator-form-1323__field--select-2_69dc3c0dc7a7b-label\" class=\"forminator-label\">Which approach should be used for the penetration test?<\/label><select  id=\"forminator-form-1323__field--select-2_69dc3c0dc7a7b\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-2\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1323__field--select-2_69dc3c0dc7a7b-label\" aria-describedby=\"forminator-form-1323__field--select-2_69dc3c0dc7a7b-description\"><option value=\"WhiteBox\"  data-calculation=\"0\">White box - a lot of information is available to the testers (e.g. access to log information, source code, different user types)<\/option><option value=\"GrayBox\"  data-calculation=\"0\">Gray Box - some but not all information is available to the testers<\/option><option value=\"BlackBox\"  data-calculation=\"0\">Black box - no information is available to the testers.<\/option><\/select><span id=\"forminator-form-1323__field--select-2_69dc3c0dc7a7b-description\" class=\"forminator-description\">We recommend the white box approach, as it is the most efficient in terms of implementation.<\/span><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-3\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-3-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"3\"\n\t\t\t\tdata-label=\"Page  3\"\n\t\t\t\tdata-actual-label=\"Page 4\"\n\t\t\t\tdata-name=\"\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69dc3c0dc7a7b\" id=\"forminator-field-name-1_69dc3c0dc7a7b-label\" class=\"forminator-label\">Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"z. e.g. Max Mustermann\" id=\"forminator-field-name-1_69dc3c0dc7a7b\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69dc3c0dc7a7b\" id=\"forminator-field-email-1_69dc3c0dc7a7b-label\" class=\"forminator-label\">e-mail address<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"z. E.G. max@mustermann.de\" id=\"forminator-field-email-1_69dc3c0dc7a7b\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69dc3c0dc7a7b\" id=\"forminator-field-phone-1_69dc3c0dc7a7b-label\" class=\"forminator-label\">Telephone <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"z. B.: +49 123 4567 89\" id=\"forminator-field-phone-1_69dc3c0dc7a7b\" class=\"forminator-input forminator-field--phone\" data-required=\"1\" aria-required=\"true\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69dc3c0dc7a7b\" id=\"forminator-field-textarea-1_69dc3c0dc7a7b-label\" class=\"forminator-label\">Do you have further information that we should know?<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69dc3c0dc7a7b\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69dc3c0dc7a7b\" id=\"forminator-field-consent-1_69dc3c0dc7a7b-label\" class=\"forminator-label\">Consent to data processing <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69dc3c0dc7a7b__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69dc3c0dc7a7b\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69dc3c0dc7a7b-label\" aria-describedby=\"forminator-field-consent-1_69dc3c0dc7a7b__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69dc3c0dc7a7b__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Yes, I agree that my data just collected may be used in accordance with <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">Data protection regulations<\/a> and <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">GTC<\/a> may be processed by Laokoon Security GmbH.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><button class=\"forminator-button forminator-pagination-submit\" style=\"display: none;\" disabled>Send message<\/button><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"a6f095d629\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/24\" \/><input type=\"hidden\" name=\"form_id\" value=\"1323\"><input type=\"hidden\" name=\"page_id\" value=\"24\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/laokoon-security.com\/en\/service\/kubernetes-pentest\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_9\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_9\" type=\"text\" name=\"input_9\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-4f7ca424 wp-block-group-is-layout-flex\" style=\"margin-top:80px;margin-bottom:0px;padding-right:15px;padding-left:15px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b34fc131 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-0a9e79ae7f018d4195fe6357c43b118d wp-container-content-9e2f13cb\">The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-5a652d193299fa90dc05bed09215521d wp-container-content-577e1c61\"><em>Team Leader Development<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<style>\n.select2-selection {\n\tborder: none!important;\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown-container--open .forminator-custom-form-1323.forminator-dropdown--default {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-results__options  {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-selection__rendered {\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown {\nborder: none!important;\n}\n\n.select2-selection .forminator-icon-chevron-down {\n\tcolor: var(--wp--preset--color--primary)!important;\n}\n\n.select2-results {\n\tborder: none!important;\n}\n\n.select2-results__option--selected {\n\tbackground-color: var(--wp--preset--color--primary)!important;\n}\n<\/style>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Kubernetes Penetrationstest Vom Container bis zum Cluster: Ganzheitliche Sicherheit Kubernetes Penetrationstest Die Containerisierung von Anwendungen oder gar ganzen Infrastrukturen nimmt Fahrt auf und vereinfacht die Verwaltung von komplexen Anwendungsf\u00e4llen. Zwar verringert sich die Komplexit\u00e4t in der Verwaltung, jedoch k\u00f6nnen sich durch Unwissenheit, fehlende Erfahrung oder falsche Anwendung Sicherheitsl\u00fccken im Container-Setup einschleichen, die es Angreifern erm\u00f6glichen, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":460,"parent":18,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-24","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":10,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/24\/revisions"}],"predecessor-version":[{"id":3840,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/24\/revisions\/3840"}],"up":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/18"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media\/460"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}