- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 183字
- 2021-06-18 18:32:36
Threats in Kubernetes clusters
With our new understanding of Kubernetes components and threat actors, we're moving on to the journey of threat modeling a Kubernetes cluster. In the following table, we cover the major Kubernetes components, nodes, and pods. Nodes and pods are the fundamental Kubernetes objects that run workloads. Note that all these components are assets and should be protected from threats. Any of these components getting compromised could lead to the next step of an attack, such as privilege escalation. Also, note that kube-apiserver and etcd are the brain and heart of a Kubernetes cluster. If either of them were to get compromised, that would be game over.
The following table highlights the threats in the default Kubernetes configuration. This table also highlights how developers and cluster administrators can protect their assets from these threats:




This table only highlights some of the threats. There are more threats, which will be covered in later chapters. We hope the preceding table will inspire you to think out loud about what needs to be protected and how to protect it in your Kubernetes cluster.
- 審計全流程技術操作實務指南
- Mastering System Center Configuration Manager
- 企業能源審計與節能規劃
- 項目管理(第二版)
- 非線性經濟關系的建模
- 中國政府統計問題研究
- vSphere Design Best Practices
- 風險導向審計準則實施效果研究
- Big Data Analytics with R and Hadoop
- Getting Started with Oracle Tuxedo
- 計量經濟學理論與應用:基于Eviews的應用分析
- 效益實現管理實踐指南
- 多項目管理方法及其應用研究(國家社科基金后期資助項目)
- Oracle Enterprise Manager 12c Administration Cookbook
- 績效考核與薪酬激勵精細化設計必備全書