Part 4: Kubernetes Threat Model (18%)
This part introduces threat modeling for Kubernetes and common attack surfaces, setting context before platform security and compliance.
Modules
Section titled “Modules”| Module | Topic | Complexity | Time |
|---|---|---|---|
| 4.1 | Attack Surfaces | Medium | 20-30 min |
| 4.2 | Vulnerabilities | Medium | 20-30 min |
| 4.3 | Container Escape | Medium | 20-30 min |
| 4.4 | Supply Chain Risk | Medium | 20-30 min |
| 4.5 | Threat Modeling & Supply Chain Theory | Medium | 20-30 min |
What You’ll Learn
Section titled “What You’ll Learn”- How to reason about cluster, node, and workload attack surfaces
- Common vulnerability categories and container escape paths
- Supply chain risks and mitigations
- A lightweight threat-modeling workflow you can apply to clusters and workloads