GeistHaus
log in · sign up

STRIDE threat modeling on Kubernetes pt.2/6: Tampering

blog.maxgio.me

In the previous post of this little series we talked about preventing spoofing on Kubernetes. Today we’ll talk about the T of STRIDE: Tampering. Tampering is the act of changing something in a malicious way, to gain extra privileges or for denial of service. Generally for preventing tampering is important to: limit the access to critical components; control the access to critical components; Furthermore, it’s important to watch for evidence of tampering.

0 pages link to this URL

No pages have linked to this URL yet.