- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 184字
- 2021-06-18 18:32:37
Summary
In this chapter, we started by introducing the basic concepts of threat modeling. We discussed the important assets, threats, and threat actors in Kubernetes environments. We discussed different security controls and mitigation strategies to improve the security posture of your Kubernetes cluster.
Then we walked through application threat modeling, taking into consideration applications deployed in Kubernetes, and compared it to the traditional threat modeling of monolithic applications. The complexity introduced by the Kubernetes design makes threat modeling more complicated, as we've shown: more assets to be protected and more threat actors. And more security control doesn't necessarily mean more safety.
You should keep in mind that although threat modeling can be a long and complex process, it is worth doing to understand the security posture of your environment. It's quite necessary to do both application threat modeling and infrastructure threat modeling together to better secure your Kubernetes cluster.
In the next chapter, to help you learn about securing your Kubernetes cluster to the next level, we will talk about the principle of least privilege and how to implement it in the Kubernetes cluster.
- 汪博士詳解PMP?模擬題(第4版)
- 自愿審計動機與質量研究:基于我國中期財務報告審計的經驗證據
- 資本的眼睛
- 國有企業經濟責任審計實務指南
- 金融保險集團內部審計創新與實踐
- 博弈論及其在經濟管理中的應用
- Programming Microsoft Dynamics NAV(Fifth Edition)
- 2017年度注冊會計師全國統一考試專用教材(圖解版):審計
- 中國審計市場:制度變遷與競爭行為
- 企業內部審計全流程指南
- 公司內部審計
- Big Data Analytics with R and Hadoop
- Oracle E-Business Suite Financials R12:A Functionality Guide
- Getting Started with Citrix? Provisioning Services 7.0
- 人口預測模型研究及應用