https://www.cyberark.com/resources/threat-research-blog/kubernetes-pentest-methodology-part-1
https://github.com/aquasecurity/kube-hunter
https://github.com/inguardians/peirates
https://www.tenable.com/blog/auditing-kubernetes-for-secure-configurations