• Skip to primary navigation
  • Skip to content
  • Skip to footer
tl;dr sec tl;dr sec
  • Start Here
  • Blog
  • Summaries
  • Newsletter
  • Guides
    Further Reading
    • Introduction
      • Start Here
      • Intro & Kubernetes Overview
      • What Does A 'Secure' Cluster Look Like?
      • Tooling Up
    • Understanding Your Environment
      • Understanding Your Environment
      • How are you deploying Kubernetes?
      • What's Running In Your Cluster?
      • What's Running Next To Your Cluster?
    • Understanding Your Risk
      • Understanding Your Risk
      • What Services are Exposed?
      • How Vulnerable Is My Cluster?
      • Common Compromise Scenarios
    • Wrapping Up
      • Putting It All Together
      • Further Reading

    Further Reading

    less than 1 minute read

    Table of Contents

    • Kubernetes Threat Modelling
    • More Tools
    • Favorite Talks

    On this page: For those still interested in additional information about threat modelling, tools, and some other talks that help you learn about assessing the risk of Kubernetes.

    Kubernetes Threat Modelling

    • Kubernetes AttackTrees
    • Threat Modeling Simulator
    • ATT&CK Matrix Kubernetes
    • CloudSec Docs on K8s Threat Modelling
    • Kubernetes Best Practice Guide by Simon Pirschel

    More Tools

    • GKE-Auditor from Google
    • Kube-Linter analyzes yaml files against best practices
    • Checkov: Helm Chart Security Anayzer
    • Headlamp from Kinvolk
    • Octant from Vmware/Tanzu
    • Lens K8s IDE/UI
    • Starboard By Aquasec

    Favorite Talks

    • PKI the Wrong Way: Simple TLS Mistakes and Surprising Consequences - Tabitha Sable
    • Vulnerabilities in Kubernetes, an interview with Maya (KubeCon 2019)
    • Walls Within Walls: What if Your Attacker Knows Parkour? - Tim Allclair & Greg Castle
    • Shipping in Pirate-Infested Waters: Practical Attack and Defense in Kubernetes [A] - Greg Castle
    • A Hacker’s Guide to Kubernetes and the Cloud - Rory McCune
    • Who Protects What? Shared Security in GKE
    • Effective RBAC by Jordan Ligat

    Updated: January 31, 2023

    Previous Next
    • Twitter
    • GitHub
    • Feed
    © 2023 tl;dr sec. Powered by Jekyll & Minimal Mistakes.