Attack techniques
Topics to cover:
- Api key leak
- CI/CD compromise
- Credential harvesting
- Docker socket abuse
- Kubernetes lateral movement
- Metadata service abuse
- Serverless abuse
- Supply chain attacks
- Container escape
- Data exfiltration
- IAM privilege escalation
- Kubernetes privilege escalation
- Public storage exposure
- STS token abuse