Questions

  1. When do you start threat modeling your application?
  2. What are the different threat actors in Kubernetes environments?
  3. Name one of the most severe threats to the default Kubernetes deployment.
  4. Why is threat modeling more difficult in a Kubernetes environment?
  5. How does the attack surface of deployments in Kubernetes compare to deployments in traditional architectures?