In the STRIDE threat modelling framework, what does the letter D stand for?
A malicious user is targeting the etcd key-value store of a Kubernetes cluster for data exfiltration.
Which option describes how an adversary can access sensitive data from etcd?
Is it a best practice to let an application Pod use the underlying node's identity and credentials to authenticate to a datastore?
A user needs to maintain the audit policy of a Kubernetes cluster and wants to make sure that they log the most information in regard to Pod changes.
Which level do they select for the Pod resource?
Which of the following is a recommendation in the NSA and CISA Kubernetes Hardening Guidance on namespaces?