- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 184字
- 2021-06-18 18:32:37
Summary
In this chapter, we started by introducing the basic concepts of threat modeling. We discussed the important assets, threats, and threat actors in Kubernetes environments. We discussed different security controls and mitigation strategies to improve the security posture of your Kubernetes cluster.
Then we walked through application threat modeling, taking into consideration applications deployed in Kubernetes, and compared it to the traditional threat modeling of monolithic applications. The complexity introduced by the Kubernetes design makes threat modeling more complicated, as we've shown: more assets to be protected and more threat actors. And more security control doesn't necessarily mean more safety.
You should keep in mind that although threat modeling can be a long and complex process, it is worth doing to understand the security posture of your environment. It's quite necessary to do both application threat modeling and infrastructure threat modeling together to better secure your Kubernetes cluster.
In the next chapter, to help you learn about securing your Kubernetes cluster to the next level, we will talk about the principle of least privilege and how to implement it in the Kubernetes cluster.
- Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c
- 新中國審計制度變遷
- 基于價值增值的治理導(dǎo)向型內(nèi)部審計研究
- Citrix XenApp? 7.5 Desktop Virtualization Solutions
- 讓財報說話:世界500強CFO帶你輕松讀財報(鮮讀版)
- Splunk:Enterprise Operational Intelligence Delivered
- Microsoft Dynamics CRM 2011 Scripting Cookbook
- 財務(wù)審計實務(wù)指南
- 基本有用的計量經(jīng)濟學(xué)
- 陜西國家統(tǒng)計調(diào)查專題研究集萃(2006—2015)
- 審計基礎(chǔ)
- AO2011實用手冊
- 新編統(tǒng)計學(xué)
- 陜西國家統(tǒng)計調(diào)查市、縣優(yōu)秀報告集萃(2006—2015)(上下)
- 中國國內(nèi)生產(chǎn)總值核算問題研究