Applied threat modeling moves beyond theory to expose the real attack vectors to containerized web applications. We dive deep into near real-time container threat detection, prevention, and management with an emphasis on automation to prevent the latest container and orchestration Common Vulnerabilities and Exposures from compromising a cloud deployment. Our container orchestration threat model is a reusable architecture design pattern that can enrich an organization’s cloud security model.
We take the practice of threat modeling and dive deep into a customize attack library for the Cloud that has been created to capture the cyber security and privacy risks associated with deploying and managing container and orchestration technologies. We investigate proof-of-concept exploits and validate them against an architectural design pattern that is resilient to attack and misuse.