Summary

Summary of the concepts learned in this chapter.

In this chapter, we used STRIDE to threaten model Kubernetes. We stepped through the six categories of threats and looked at some ways to prevent and mitigate them.

We saw that one threat can often lead to another, and there are multiple ways to mitigate a single threat. As always, defense in depth is a key tactic.

We finished the chapter by discussing how Pod Security Policies provide a flexible and scalable way to implement Pod security defaults.

Get hands-on with 1200+ tech skills courses.