官术网_书友最值得收藏!

Summary

In this chapter, we started by introducing the basic concepts of threat modeling. We discussed the important assets, threats, and threat actors in Kubernetes environments. We discussed different security controls and mitigation strategies to improve the security posture of your Kubernetes cluster.

Then we walked through application threat modeling, taking into consideration applications deployed in Kubernetes, and compared it to the traditional threat modeling of monolithic applications. The complexity introduced by the Kubernetes design makes threat modeling more complicated, as we've shown: more assets to be protected and more threat actors. And more security control doesn't necessarily mean more safety.

You should keep in mind that although threat modeling can be a long and complex process, it is worth doing to understand the security posture of your environment. It's quite necessary to do both application threat modeling and infrastructure threat modeling together to better secure your Kubernetes cluster.

In the next chapter, to help you learn about securing your Kubernetes cluster to the next level, we will talk about the principle of least privilege and how to implement it in the Kubernetes cluster.

主站蜘蛛池模板: 通河县| 通海县| 宜昌市| 洛南县| 陆川县| 泽州县| 沙坪坝区| 四平市| 岳普湖县| 宝山区| 勐海县| 望奎县| 南康市| 汨罗市| 图木舒克市| 常熟市| 泾川县| 乌拉特中旗| 五家渠市| 吴堡县| 武宣县| 平舆县| 林州市| 文登市| 盘山县| 邳州市| 恩施市| 景洪市| 上栗县| 谷城县| 峨眉山市| 泰来县| 当涂县| 从化市| 慈利县| 林周县| 余庆县| 吉林省| 潜山县| 玉田县| 兴化市|