Establish what are the Attack Surfaces in K8S and which ones would you like to address.
Can be created as:
- Kubernetes Operator (basically an app deployed in the cluster)
- kubectl plugin (extend kubectl CLI with new features): every API call to k8s goes through a 3-step process (authentication,authorization,admission controllers)