Security Congress Abstract
We take the practice of threat modeling and dive deep into a customize attack library for the cloud that has been created to capture the cybersecurity and privacy risks associated with deploying and managing container and orchestration technologies. We investigate proof-of-concept exploits and validate them against an architectural design pattern that is resilient to attack and misuse. Applied threat modeling moves beyond theory to expose the real attack vectors to containerized applications.
We dive deep into near-real-time container threat detection, prevention and management with an emphasis on automation to prevent the latest container and orchestration common vulnerabilities and exposures from compromising a cloud deployment. Our container orchestration threat model is a reusable architecture design pattern that can enrich an organization’s cloud security model.