WOKTHREATS


Threats in Kubernetes

Compromised accounts: In cases where Kubernetes clusters are deployed in public clouds (such as Azure Kubernetes Service (AKS) or Google Kubernetes Engine (GKE)), compromised cloud credentials could lead to cluster takeover, as attackers who have access to account credentials can get access to the cluster’s management layer.
Vulnerable or misconfigured images:

Images that are not updated regularly might contain vulnerabilities that can be exploited in malicious attacks.
Environment misconfigurations:

An attacker with access to the Kubernetes API, either through exposed management interfaces or lack of appropriate authentication/authorization controls, could completely take down the server, deploy malicious containers, or hijack the entire cluster.
App-level attacks:
Applications could be exploited through several typical methods, such as SQL injection, cross-site scripting, and remote file inclusion.
Node-level attacks:
Attackers can gain initial access through nodes (host machines that containers run on) that run on vulnerable code or software, have open management interfaces such as SSH, or run commands from the cloud control plane. There is also the risk of pod escape, where a compromised pod can provide access to the node or to other pods in the cluster.
Unauthorized traffic:
Insecure networking between the different containers within the cluster and between the pods and outside world could be subject to malicious traffic if not secured.