官术网_书友最值得收藏!

Threat modeling application in Kubernetes

Now that we have looked at threats in a Kubernetes cluster, let's move on to discuss how threat modeling will differ for an application deployed on Kubernetes. Deployment in Kubernetes adds additional complexities to the threat model. Kubernetes adds additional considerations, assets, threat actors, and new security controls that need to be considered before investigating the threats to the deployed application.

Let's look at a simple example of a three-tier web application:

Figure 3.4 – Threat model of a traditional web application

The same application looks a little different in the Kubernetes environment:

Figure 3.5 – Threat model of the three-tier web application in Kubernetes

As shown in the previous diagram, the web server, application server, and databases are all running inside pods. Let's do a high-level comparison of threat modeling between traditional web architecture and cloud-native architecture:

To summarize the preceding comparison, you will find that more assets need to be protected in a cloud-native architecture, and you will face more threat actors in this space. Kubernetes provides more security controls, but it also adds more complexity. More security controls doesn't necessarily mean more security. Remember: complexity is the enemy of security.

主站蜘蛛池模板: 扎赉特旗| 株洲县| 安新县| 东丰县| 监利县| 万年县| 永康市| 富平县| 浠水县| 蛟河市| 普定县| 灌云县| 南开区| 揭东县| 东丰县| 宣汉县| 崇州市| 敖汉旗| 许昌县| 武威市| 西安市| 阜新市| 枝江市| 九寨沟县| 鄢陵县| 河源市| 乐都县| 麻江县| 张家川| 康马县| 普兰县| 吉木乃县| 贵南县| 南郑县| 嘉峪关市| 永济市| 星座| 孟村| 龙胜| 恭城| 徐闻县|