This resource is no longer available
Organizations often rely on an open-source container orchestration for security functions such as authentication, authorization, logging and resource isolation, as well as workload and network segmentation.
For many, this means using Kubernetes container runtime environment. However, within this environement there are typically 4 types of threats, including:
- External attacks aiming to compromise controls
- Compromised containers or nodes
- Compromised credentials
- Misuse of legitimate privileges
This resource discusses these threat models and various security considerations for a secure Kubernetes deployment as well as best practices for acquiring optimal results.