KCSA Notes
CtrlK
Home
  • Overview
  • COVERAGE
    • Overview of Cloud Native Security
    • Kubernetes Cluster Component Security
    • Kubernetes Security Fundamentals
    • Kubernetes Threat Model
    • Platform Security
    • Compliance and Security Frameworks
  • REVIEW
    • Practice Test
  • SUMMARY & REFERENCES
    • My Notes (Cheatsheet)
    • Other References
  • About #thecloudspark
Powered by GitBook
On this page
  • Kubernetes Trust Boundaries and Data Flow
  • Securing a Cluster
  1. COVERAGE

Kubernetes Threat Model

Kubernetes Trust Boundaries and Data Flow

References:

  • https://owasp-kstg.netlify.app/threat-model/trust-boundaries.html

Securing a Cluster

  • Persistence

  • Denial of Service

  • Malicious Code Execution and Compromised Applications in Containers

  • Attacker on the Network

  • Access to Sensitive Data

  • Privilege Escalation

References:

  • https://kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/

  • https://kubernetes.io/docs/concepts/architecture/control-plane-node-communication/

  • https://kubernetes.io/docs/concepts/security/rbac-good-practices/

PreviousKubernetes Security FundamentalsNextPlatform Security

Last updated 1 year ago