secure-k8s-containers The steps to reproduce demos from Secure your Kubernetes Containers: Access Insecure Api Server Modify web app container file system Schedule a crypto miner using static pods Stop Privileged containers with Pod Security Policy Limit access to a service using a network policy