Threat Modelling Kubernetes (1 day)

Traditional on-premise systems rely heavily on perimeter and firewall security: Kubernetes and cloud native systems present new threat profiles. Cloud technologies change rapidly as vendors introduce new managed services, and users evolve their usage of an ever-expanding toolset. Kubernetes moves fast and security must keep up with the speed of innovation.

Secure Kubernetes usage requires a thorough understanding of the system, its information assets, and any threats or risks posed by its use. In this course, we introduce modern and lightweight threat modelling. These techniques are designed for evolving cloud systems, to help security and engineering teams increase the security and velocity of system delivery.

Course Outline

  • Introduction to the basic principles of threat modelling in a Kubernetes context:
  • What are we building?
    • Business impact assessments for data
    • Data flow diagrams and information flow matrices
    • Understanding threat landscapes and adversaries
    • Kubernetes technical overview
    • Introduction to an example architecture to threat model
    • Information flow matrix lab
  • What can go wrong?
    • Gathering techniques and threat sources
    • Modelling techniques
      • STRIDE
      • Attack Trees
    • Building Attack Trees as code
    • Key differences between cloud native and on-prem
    • Key Kubernetes threats to workloads, storage, networking and the control plane
    • STRIDE brainstorming lab
  • What are we going to do about that?
    • Risk management techniques
    • Key Kubernetes security controls
    • Lab on selecting proportionate controls
  • Did we do a good enough job?
    • Iterative threat modelling
    • Scaling the threat modelling process
    • Testing security controls in a hands-on lab

Who Should Attend

This course is designed for anyone with a basic understanding of Kubernetes and cloud infrastructure who is interested in investigating formal threat modelling in a cloud native context. It is suitable for security architects and developers, and anyone who aspires to become a Security Champion, driving decisions with a sound understanding of the threats in your organisation’s business environment.


Learn More

To understand how we collaborate with your team, customise to your needs, or talk to one of our instructors, contact us.