STRIDE threat modeling on Kubernetes pt.5/6: Denial of service

I’m back after a long time with the fifth episode of this mini-series about STRIDE threat modeling in Kubernetes. In the previous one we talked about Information disclosure. This part is about the D that stands for Denial Of Service. DOS is the attempt to making a resource unavailable. For instance, a Kubernetes dashboard is left exposed on the Internet, allowing anyone to deploy containers on your company’s infrastructure to mine cryptocurrency and starve your legitimate applications of CPU (really happened - thanks Peter)....

September 7, 2020 · 6 min

STRIDE threat modeling on Kubernetes pt.4/6: Information disclosure

This is the fourth part of a series about STRIDE threat modeling in Kubernetes. In the previous part we talked about repudiation, instead today we’ll going to address information disclosure. Information disclosure happens with data leaks or data breaches, whenever a system that is designed to be closed to an eavesdropper unintentionally reveals some information to unauthorized parties. To prevent this we should protect data in transit and at rest by guaranteeing confidentiality, which can be guaranteed with encryption....

March 23, 2020 · 14 min

STRIDE threat modeling on Kubernetes pt.3/6: Repudiation

Hi all, this is the third part of this little series about STRIDE threat modeling on Kubernetes. Previously we talked about Tampering; today we talk about Repudiation. Repudiation is the ability to cast doubt on something that happened. What typically happens is that the attacker aims to deny the authorship of his actions. Generally the opposite and thus the desired goal is prooving: What When Where Why Who How on certain actions....

February 23, 2020 · 6 min

STRIDE threat modeling on Kubernetes pt.2/6: Tampering

In the previous post of this little series we talked about preventing spoofing on Kubernetes. Today we’ll talk about the T of STRIDE: Tampering. Tampering is the act of changing something in a malicious way, to gain extra privileges or for denial of service. Generally for preventing tampering is important to: limit the access to critical components; control the access to critical components; Furthermore, it’s important to watch for evidence of tampering....

February 11, 2020 · 3 min

STRIDE threat modeling on Kubernetes pt.1/6: Spoofing

As it comes from the power of the open source and Borg, Kubernetes is an ecosystem very flexible. Only the extensibility of the APIs as for the CRDs opens the world to a vastity of opportunities to build architectures upon it (see the SIG’s Cluster API, the AWS EKS and Fargate combinations, etc.). At the same time can be complex to manage, and everyone - or almost everyone - knows that is not enough to get applications working; as part of the administration it is vital to secure your cluster and so your application with your data to get the job done....

February 3, 2020 · 3 min