References:
https://owasp-kstg.netlify.app/threat-model/trust-boundaries.htmlarrow-up-right
Persistence
Denial of Service
Malicious Code Execution and Compromised Applications in Containers
Attacker on the Network
Access to Sensitive Data
Privilege Escalation
https://kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/arrow-up-right
https://kubernetes.io/docs/concepts/architecture/control-plane-node-communication/arrow-up-right
https://kubernetes.io/docs/concepts/security/rbac-good-practices/arrow-up-right
Last updated 1 year ago