官术网_书友最值得收藏!

Threat modeling application in Kubernetes

Now that we have looked at threats in a Kubernetes cluster, let's move on to discuss how threat modeling will differ for an application deployed on Kubernetes. Deployment in Kubernetes adds additional complexities to the threat model. Kubernetes adds additional considerations, assets, threat actors, and new security controls that need to be considered before investigating the threats to the deployed application.

Let's look at a simple example of a three-tier web application:

Figure 3.4 – Threat model of a traditional web application

The same application looks a little different in the Kubernetes environment:

Figure 3.5 – Threat model of the three-tier web application in Kubernetes

As shown in the previous diagram, the web server, application server, and databases are all running inside pods. Let's do a high-level comparison of threat modeling between traditional web architecture and cloud-native architecture:

To summarize the preceding comparison, you will find that more assets need to be protected in a cloud-native architecture, and you will face more threat actors in this space. Kubernetes provides more security controls, but it also adds more complexity. More security controls doesn't necessarily mean more security. Remember: complexity is the enemy of security.

主站蜘蛛池模板: 鹤峰县| 九寨沟县| 类乌齐县| 阿鲁科尔沁旗| 上杭县| 西宁市| 中方县| 合江县| 肇州县| 大渡口区| 台中市| 宝山区| 三原县| 昭苏县| 青海省| 宝丰县| 南澳县| 柳州市| 昭通市| 平潭县| 通山县| 庆安县| 阳泉市| 盐边县| 怀安县| 玉龙| 长寿区| 察雅县| 太湖县| 格尔木市| 惠水县| 开阳县| 来安县| 庆阳市| 苏尼特左旗| 金坛市| 延边| 福鼎市| 施秉县| 承德县| 闽侯县|