- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 198字
- 2021-06-18 18:32:36
Threat modeling application in Kubernetes
Now that we have looked at threats in a Kubernetes cluster, let's move on to discuss how threat modeling will differ for an application deployed on Kubernetes. Deployment in Kubernetes adds additional complexities to the threat model. Kubernetes adds additional considerations, assets, threat actors, and new security controls that need to be considered before investigating the threats to the deployed application.
Let's look at a simple example of a three-tier web application:

Figure 3.4 – Threat model of a traditional web application
The same application looks a little different in the Kubernetes environment:

Figure 3.5 – Threat model of the three-tier web application in Kubernetes
As shown in the previous diagram, the web server, application server, and databases are all running inside pods. Let's do a high-level comparison of threat modeling between traditional web architecture and cloud-native architecture:


To summarize the preceding comparison, you will find that more assets need to be protected in a cloud-native architecture, and you will face more threat actors in this space. Kubernetes provides more security controls, but it also adds more complexity. More security controls doesn't necessarily mean more security. Remember: complexity is the enemy of security.
- Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c
- 自愿審計動機與質量研究:基于我國中期財務報告審計的經驗證據
- 讓財報說話:世界500強CFO帶你輕松讀財報(鮮讀版)
- AO2011實用手冊
- Microsoft Dynamics NAV
- 從零開始學房地產會計
- 企業并購審查中的相關市場界定:理論與案例
- 高級計量經濟分析及Stata應用
- 政策建模技術:CGE模型的理論與實現
- Business Intelligence Cookbook:A Project Lifecycle Approach Using Oracle Technology
- Implementing VMware Horizon 7.7
- 內部審計情景案例:理解審計行為,辨析審計決策
- 看穿一切數字的統計學
- 汪博士解讀PMP?考試(第6版)
- Oracle Enterprise Manager 12c Administration Cookbook