Kubernetes Threat Model

Kubernetes Trust Boundaries and Data Flow

Securing a Cluster

  • Persistence

  • Denial of Service

  • Malicious Code Execution and Compromised Applications in Containers

  • Attacker on the Network

  • Access to Sensitive Data

  • Privilege Escalation

Last updated