- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 198字
- 2021-06-18 18:32:36
Threat modeling application in Kubernetes
Now that we have looked at threats in a Kubernetes cluster, let's move on to discuss how threat modeling will differ for an application deployed on Kubernetes. Deployment in Kubernetes adds additional complexities to the threat model. Kubernetes adds additional considerations, assets, threat actors, and new security controls that need to be considered before investigating the threats to the deployed application.
Let's look at a simple example of a three-tier web application:

Figure 3.4 – Threat model of a traditional web application
The same application looks a little different in the Kubernetes environment:

Figure 3.5 – Threat model of the three-tier web application in Kubernetes
As shown in the previous diagram, the web server, application server, and databases are all running inside pods. Let's do a high-level comparison of threat modeling between traditional web architecture and cloud-native architecture:


To summarize the preceding comparison, you will find that more assets need to be protected in a cloud-native architecture, and you will face more threat actors in this space. Kubernetes provides more security controls, but it also adds more complexity. More security controls doesn't necessarily mean more security. Remember: complexity is the enemy of security.
- Microsoft Dynamics GP 2016 Cookbook
- 新中國審計制度變遷
- 國有企業經濟責任審計實務指南
- 審計學基礎
- 金融保險集團內部審計創新與實踐
- 讓財報說話:世界500強CFO帶你輕松讀財報(鮮讀版)
- Citrix? XenMobile? Mobile Device Management
- 財務審計實務指南
- 大數據搜索與挖掘及可視化管理方案 :Elastic Stack 5:Elasticsearch、Logstash、Kibana、X-Pack、Beats (第3版)
- OAuth 2.0 Identity and Access Management Patterns
- 審計基礎
- 政策建模技術:CGE模型的理論與實現
- QlikView for Developers Cookbook
- Building Dashboards with Microsoft Dynamics GP 2016(Second Edition)
- INSTANT IBM Lotus Notes 8.5.3 How-to