Learn Kubernetes Security
上QQ阅读APP看书,第一时间看更新

Questions

  1. When do you start threat modeling your application?
  2. What are the different threat actors in Kubernetes environments?
  3. Name one of the most severe threats to the default Kubernetes deployment.
  4. Why is threat modeling more difficult in a Kubernetes environment?
  5. How does the attack surface of deployments in Kubernetes compare to deployments in traditional architectures?