- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 198字
- 2021-06-18 18:32:36
Threat modeling application in Kubernetes
Now that we have looked at threats in a Kubernetes cluster, let's move on to discuss how threat modeling will differ for an application deployed on Kubernetes. Deployment in Kubernetes adds additional complexities to the threat model. Kubernetes adds additional considerations, assets, threat actors, and new security controls that need to be considered before investigating the threats to the deployed application.
Let's look at a simple example of a three-tier web application:

Figure 3.4 – Threat model of a traditional web application
The same application looks a little different in the Kubernetes environment:

Figure 3.5 – Threat model of the three-tier web application in Kubernetes
As shown in the previous diagram, the web server, application server, and databases are all running inside pods. Let's do a high-level comparison of threat modeling between traditional web architecture and cloud-native architecture:


To summarize the preceding comparison, you will find that more assets need to be protected in a cloud-native architecture, and you will face more threat actors in this space. Kubernetes provides more security controls, but it also adds more complexity. More security controls doesn't necessarily mean more security. Remember: complexity is the enemy of security.
- 資本的眼睛
- 金融保險集團內部審計創新與實踐
- 會計信息化基礎(金蝶版)
- 審計實務案例與實訓教程
- 2016年度注冊會計師全國統一考試專用輔導教材(圖解版):審計
- Salesforce Essentials for Administrators
- 《企業內部控制基本規范》合規實務指南
- 振蕩指標MACD:波段操作精解(升級版)
- vSphere Design Best Practices
- 新編統計學
- 從零開始學房地產會計
- Microsoft Dynamics NAV
- Getting Started with Microsoft Lync Server 2013
- Big Data Analytics with R and Hadoop
- 多項目管理方法及其應用研究(國家社科基金后期資助項目)