官术网_书友最值得收藏!

  • Learn Kubernetes Security
  • Kaizhe Huang Pranjal Jumde Loris Degioanni
  • 319字
  • 2021-06-18 18:32:35

Threat actors in Kubernetes environments

A threat actor is an entity or code executing in the system that the asset should be protected from. From a defense standpoint, you first need to understand who your potential enemies are, or your defense strategy will be too vague. Threat actors in Kubernetes environments can be broadly classified into three categories:

  1. End user: An entity that can connect to the application. The entry point for this actor is usually the load balancer or ingress. Sometimes, pods, containers, or NodePorts may be directly exposed to the internet, adding more entry points for the end user.
  2. Internal attacker: An entity that has limited access inside the Kubernetes cluster. Malicious containers or pods spawned within the cluster are examples of internal attackers.
  3. Privileged attacker: An entity that has administrator access inside the Kubernetes cluster. Infrastructure administrators, compromised kube-apiserver instances, and malicious nodes are all examples of privileged attackers.

Examples of threat actors include script kiddies, hacktivists, and nation-state actors. All these actors fall into the three aforementioned categories, depending on where in the system the actor exists.

The following diagram highlights the different actors in the Kubernetes ecosystem:

Figure 3.3 – Threat actors in Kubernetes environments

As you can see in this diagram, the end user generally interacts with the HTTP/HTTPS routes exposed by the ingress controller, the load balancer, or the pods. The end user is the least privileged. The internal attacker on the other hand has limited access to resources within the cluster. The privileged attacker is most privileged and has the ability to modify the cluster. These three categories of attackers help determine the severity of a threat. A threat involving an end user has a higher severity compared to a threat involving a privileged attacker. Although these roles seem isolated in the diagram, an attacker can change from an end user to an internal attacker using an elevation of privilege attack.

主站蜘蛛池模板: 中方县| 黄石市| 西乌珠穆沁旗| 同心县| 汉沽区| 汶川县| 舟山市| 聂拉木县| 襄樊市| 杭锦旗| 莫力| 囊谦县| 渝北区| 驻马店市| 成武县| 乌兰浩特市| 军事| 壤塘县| 房山区| 丹棱县| 安达市| 盐亭县| 林甸县| 邹城市| 静乐县| 安阳县| 仁怀市| 府谷县| 龙岩市| 尼勒克县| 确山县| 邻水| 绿春县| 特克斯县| 西城区| 岑巩县| 尼木县| 凉城县| 河曲县| 米泉市| 罗城|