Hack Me If You Can: Learning Kubernetes Security Through a Role-Play Battle - Aoi Takahashi, Recruit Co., Ltd. & Keita Mochizuki, NTT DATA Japan Corporation
Abstract
Have you ever felt that Kubernetes and container security are too difficult, and that running them safely in production feels uncertain?With the rise of AI, many of us have started “Vive Yamling” — quickly generating YAML manifests with AI. It accelerates development but can also introduce fragile or insecure configurations. Meanwhile, attackers now use AI to automate discovery and exploitation.In this talk, we turn Kubernetes security into an interactive stage play. Two presenters perform a live “role-play battle” between a Hacker, a Security Hero, and the Audience. The audience experiences what it feels like to be attacked.Through this playful yet realistic performance, you’ll see how AI can both create and exploit vulnerabilities, and take away practical insights to defend your cluster in an era where even attackers are powered by AI. You’ll build, get attacked, and defend — deepening your understanding of Kubernetes security while having fun along the way.