Skip to content

Part 4: Kubernetes Threat Model (18%)

This part introduces threat modeling for Kubernetes and common attack surfaces, setting context before platform security and compliance.

ModuleTopicComplexityTime
4.1Attack SurfacesMedium20-30 min
4.2VulnerabilitiesMedium20-30 min
4.3Container EscapeMedium20-30 min
4.4Supply Chain RiskMedium20-30 min
4.5Threat Modeling & Supply Chain TheoryMedium20-30 min
  • How to reason about cluster, node, and workload attack surfaces
  • Common vulnerability categories and container escape paths
  • Supply chain risks and mitigations
  • A lightweight threat-modeling workflow you can apply to clusters and workloads

← Back to Part 3 | Part 5: Platform Security →