官术网_书友最值得收藏!

Threats in Kubernetes clusters

With our new understanding of Kubernetes components and threat actors, we're moving on to the journey of threat modeling a Kubernetes cluster. In the following table, we cover the major Kubernetes components, nodes, and pods. Nodes and pods are the fundamental Kubernetes objects that run workloads. Note that all these components are assets and should be protected from threats. Any of these components getting compromised could lead to the next step of an attack, such as privilege escalation. Also, note that kube-apiserver and etcd are the brain and heart of a Kubernetes cluster. If either of them were to get compromised, that would be game over.

The following table highlights the threats in the default Kubernetes configuration. This table also highlights how developers and cluster administrators can protect their assets from these threats:

This table only highlights some of the threats. There are more threats, which will be covered in later chapters. We hope the preceding table will inspire you to think out loud about what needs to be protected and how to protect it in your Kubernetes cluster.

主站蜘蛛池模板: 乌鲁木齐市| 大同县| 绥棱县| 丹棱县| 台南县| 嫩江县| 东辽县| 泰顺县| 开远市| 类乌齐县| 延安市| 新化县| 安溪县| 泽库县| 苍梧县| 青州市| 江北区| 靖州| 瑞昌市| 肃宁县| 阳信县| 曲阳县| 广东省| 聂拉木县| 高邮市| 景洪市| 密云县| 东安县| 平乡县| 五台县| 开原市| 滦南县| 白沙| 陈巴尔虎旗| 塔河县| 连平县| 张掖市| 舒兰市| 阿巴嘎旗| 光山县| 无棣县|