- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 183字
- 2021-06-18 18:32:36
Threats in Kubernetes clusters
With our new understanding of Kubernetes components and threat actors, we're moving on to the journey of threat modeling a Kubernetes cluster. In the following table, we cover the major Kubernetes components, nodes, and pods. Nodes and pods are the fundamental Kubernetes objects that run workloads. Note that all these components are assets and should be protected from threats. Any of these components getting compromised could lead to the next step of an attack, such as privilege escalation. Also, note that kube-apiserver and etcd are the brain and heart of a Kubernetes cluster. If either of them were to get compromised, that would be game over.
The following table highlights the threats in the default Kubernetes configuration. This table also highlights how developers and cluster administrators can protect their assets from these threats:




This table only highlights some of the threats. There are more threats, which will be covered in later chapters. We hope the preceding table will inspire you to think out loud about what needs to be protected and how to protect it in your Kubernetes cluster.
- 自愿審計動機與質量研究:基于我國中期財務報告審計的經驗證據
- 新中國審計制度變遷
- 會計信息化基礎(金蝶版)
- 陜西文物年鑒·2015
- Microsoft Dynamics CRM 2011 Scripting Cookbook
- OAuth 2.0 Identity and Access Management Patterns
- 2016年度注冊會計師全國統一考試專用輔導教材(圖解版):審計
- AO2011實用手冊
- vSphere Design Best Practices
- 內審兵法
- 項目管理實務(第二版)
- Implementing VMware Horizon 7.7
- 統計學視角下的金融高頻數據挖掘理論與方法研究
- 統計原理與實務
- Getting Started with Citrix? Provisioning Services 7.0