- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 270字
- 2021-06-18 18:32:35
Chapter 3: Threat Modeling
Kubernetes is a large ecosystem comprising multiple components such as kube-apiserver, etcd, kube-scheduler, kubelet, and more. In the first chapter, we highlighted the basic functionality of different Kubernetes components. In the default configuration, interactions between Kubernetes components result in threats that developers and cluster administrators should be aware of. Additionally, deploying applications in Kubernetes introduces new entities that the application interacts with, adding new threat actors and attack surfaces to the threat model of the application.
In this chapter, we will start with a brief introduction to threat modeling and discuss component interactions within the Kubernetes ecosystem. We will look at the threats in the default Kubernetes configuration. Finally, we will talk about how threat modeling an application in the Kubernetes ecosystem introduces additional threat actors and attack surfaces.
The goal of this chapter is to help you understand that the default Kubernetes configuration is not sufficient to protect your deployed application from attackers. Kubernetes is a constantly evolving and community-maintained platform, so some of the threats that we are going to highlight in this chapter do not have mitigations because the severity of the threats varies with every environment.
This chapter aims to highlight the threats in the Kubernetes ecosystem, which includes the Kubernetes components and workloads in a Kubernetes cluster, so developers and DevOps engineers understand the risks of their deployments and have a risk mitigation plan in place for the known threats. In this chapter, we will cover the following topics:
- Introduction to threat modeling
- Component interactions
- Threat actors in the Kubernetes environment
- The Kubernetes components/objects threat model
- Threat modeling applications in Kubernetes
- Mastering Microsoft Forefront UAG 2010 Customization
- 國有企業經濟責任審計實務指南
- 博弈論及其在經濟管理中的應用
- Big Data Visualization
- Business Intelligence with MicroStrategy Cookbook
- 國家治理能力視角的國家審計功能理論研究
- 2016年度注冊會計師全國統一考試專用輔導教材(圖解版):審計
- Tableau:Creating Interactive Data Visualizations
- 風險導向審計準則實施效果研究
- Minitab Cookbook
- 下一場全球金融危機的到來:明斯基與金融不穩定
- 內審兵法
- 政策建模技術:CGE模型的理論與實現
- 內部控制審計功能與質量
- Microsoft Dynamics CRM 2016 Customization(Second Edition)