Spoofing
Learn how to prevent spoofing.
We'll cover the following...
Spoofing is pretending to be somebody else with the aim of gaining extra privileges.
Let’s look at some of the ways Kubernetes prevents different types of spoofing.
Securing communications with the API server
Kubernetes comprises lots of small components that work together. These include the API server, controller manager, scheduler, cluster store, and others. It also includes node components such as the kubelet
and container runtime. Each has its own privileges that allow it to interact with and modify the cluster. Even though Kubernetes implements a least-privilege model, spoofing the identity of any of these can cause problems.
If we read the RBAC and API security chapter, we’ll know that Kubernetes ...