官术网_书友最值得收藏!

  • Learn Kubernetes Security
  • Kaizhe Huang Pranjal Jumde Loris Degioanni
  • 183字
  • 2021-06-18 18:32:36

Threats in Kubernetes clusters

With our new understanding of Kubernetes components and threat actors, we're moving on to the journey of threat modeling a Kubernetes cluster. In the following table, we cover the major Kubernetes components, nodes, and pods. Nodes and pods are the fundamental Kubernetes objects that run workloads. Note that all these components are assets and should be protected from threats. Any of these components getting compromised could lead to the next step of an attack, such as privilege escalation. Also, note that kube-apiserver and etcd are the brain and heart of a Kubernetes cluster. If either of them were to get compromised, that would be game over.

The following table highlights the threats in the default Kubernetes configuration. This table also highlights how developers and cluster administrators can protect their assets from these threats:

This table only highlights some of the threats. There are more threats, which will be covered in later chapters. We hope the preceding table will inspire you to think out loud about what needs to be protected and how to protect it in your Kubernetes cluster.

主站蜘蛛池模板: 饶阳县| 广宁县| 教育| 常宁市| 平果县| 瑞昌市| 北碚区| 定结县| 东辽县| 辉县市| 拉萨市| 宜兰县| 台前县| 炉霍县| 呼图壁县| 舞阳县| 孟津县| 霍山县| 无极县| 油尖旺区| 大同县| 宝兴县| 新津县| 新宁县| 唐河县| 灵寿县| 巧家县| 连平县| 福贡县| 江山市| 曲靖市| 新干县| 苍梧县| 杭州市| 清河县| 肇源县| 白山市| 西安市| 读书| 蒙山县| 娱乐|