Kubernetes Threat Model
Kubernetes Trust Boundaries and Data Flow
Securing a Cluster
Persistence
Denial of Service
Malicious Code Execution and Compromised Applications in Containers
Attacker on the Network
Access to Sensitive Data
Privilege Escalation
Last updated