官术网_书友最值得收藏!

Summary

In this chapter, we started by introducing the basic concepts of threat modeling. We discussed the important assets, threats, and threat actors in Kubernetes environments. We discussed different security controls and mitigation strategies to improve the security posture of your Kubernetes cluster.

Then we walked through application threat modeling, taking into consideration applications deployed in Kubernetes, and compared it to the traditional threat modeling of monolithic applications. The complexity introduced by the Kubernetes design makes threat modeling more complicated, as we've shown: more assets to be protected and more threat actors. And more security control doesn't necessarily mean more safety.

You should keep in mind that although threat modeling can be a long and complex process, it is worth doing to understand the security posture of your environment. It's quite necessary to do both application threat modeling and infrastructure threat modeling together to better secure your Kubernetes cluster.

In the next chapter, to help you learn about securing your Kubernetes cluster to the next level, we will talk about the principle of least privilege and how to implement it in the Kubernetes cluster.

主站蜘蛛池模板: 大姚县| 天长市| 德州市| 交口县| 中山市| 喜德县| 德格县| 金塔县| 凉山| 扎赉特旗| 玛多县| 海丰县| 隆回县| 南平市| 仪征市| 肇州县| 屏东市| 罗江县| 新余市| 锦州市| 祥云县| 江山市| 云和县| 特克斯县| 大姚县| 磐安县| 黄浦区| 瑞丽市| 商都县| 德州市| 万盛区| 土默特右旗| 日土县| 文成县| 兴宁市| 三原县| 突泉县| 青冈县| 新蔡县| 墨脱县| 西贡区|