-
Book Overview & Buying
-
Table Of Contents
Learning Kubernetes Security - Second Edition
By :
Now that we have looked at the threats in a Kubernetes cluster, let’s move on to discuss how threat modeling will look for an application deployed on Kubernetes. Deployment in Kubernetes adds additional complexities to the threat model. Kubernetes adds additional considerations, assets, threat actors, and new security controls that need to be considered before investigating the threats to the deployed application.
Take a simple example of a three-tier web application, as shown in Figure 3.4:

Figure 3.4 – Three-tier web application
Figure 3.4 illustrates a typical communication flow involving a user or application interacting with a frontend web server hosted in a perimeter DMZ network, exposed to the internet via ports 443 and 80. The web server communicates with an application secured behind a firewall. Finally, the application gathers data from a database located within the corporate network, which is protected...