This resource is no longer available

Cover Image

Organizations often rely on an open-source container orchestration for security functions such as authentication, authorization, logging and resource isolation, as well as workload and network segmentation.

For many, this means using Kubernetes container runtime environment. However, within this environement there are typically 4 types of threats, including:

  • External attacks aiming to compromise controls
  • Compromised containers or nodes
  • Compromised credentials
  • Misuse of legitimate privileges

This resource discusses these threat models and various security considerations for a secure Kubernetes deployment as well as best practices for acquiring optimal results.

Vendor:
Aqua Security
Posted:
Apr 1, 2021
Published:
Aug 22, 2018
Format:
PDF
Type:
Resource

This resource is no longer available.