上QQ阅读APP看书,第一时间看更新
Questions
- When do you start threat modeling your application?
- What are the different threat actors in Kubernetes environments?
- Name one of the most severe threats to the default Kubernetes deployment.
- Why is threat modeling more difficult in a Kubernetes environment?
- How does the attack surface of deployments in Kubernetes compare to deployments in traditional architectures?