References
- Sysdig, Sysdig 2019 Container Usage Report: New Kubernetes and security insights [Internet]. Available: https://sysdig.com/blog/sysdig-2019-container-usage-report/.
- M. Aoyama, Kubernetes Perfect Guide, 1st ed. Seoul, Korea, Ltd. Gilbot, 2021.
- Cloudstore Ceart, "Main Cloud Computing Trends in 2020," Ceart Issue Report, vol. 2, pp. 12, Jan. 2020.
- Kubernetes [Internet]. Available: https://en.wikipedia.org/wiki/Kubernetes.
- K. Kim, G. Lee, T. Kim, J. Choi, S. Ha, Y. Jeong, and S. Jin, "Kubernetes Architecture for Cloud Services," Information & Communications Magazine, vol. 35, no 11, pp. 11-19, Oct. 2018.
- Kubernetes, Cloud native security overview [Internet]. Available:https://Kubernetes.io/ko/docs/concepts/security/overview/.
- H. Kang, S. Park, H. Yoon, and E. Lee, "A Study on Web Server Security Policy in Docker Kubernetes Environment," in Korea Society of IT Services 2020 Fall Conference, Seoul, Korea, pp, 632-637, 2020.
- M. Panagiotis, "Attack methods and defenses on Kubernetes," Bachelor's dissertation, University of Piraeu, Pireas, Greece, 2020.
- N. Habbal, "Enhancing Availability of Microservice Architecture," A Case Study on Kubernetess Security Configurations, Bachelor's dissertation, Lulea University of Technology, Lulea, Seden, 2020.
- T. Autio, "Securing a Kubernetes Cluster on Google Cloud Platform," Bachelor's dissertation, Metropolia University of Applied Sciences, Vantaa, Finland, 2021.
- T. Fowley, "Security of Virtual Infrastructures : Assessing Kubernetes Attack Automation," M. S. dissertation, Trinity College Dublin, Dublin, Ireland, 2021.
- H. Kim, "Cloud Security Guide (Container Security) - Docker, Kubernetes", SK infosec, Technical Report, Korea, Jun. 2019.
- Kubernetes, The 4Cs of Cloud Native Security [Internet]. Available: https://Kubernetes.io/ko/docs/concepts/security/overview/.
- NSC/CISA, "Kubernetes Hardening Guidance," NSC/CISA, Washington D.C, USA, Technical Report PP-21-1104, Ver 1.0, Aug. 2021.
- The MITRE Corp., CVE-2022-27211 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27211.
- The MITRE Corp., CVE-2022-27210 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-20 22-27210.
- The MITRE Corp., CVE-2022-27209 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-20 22-27209.
- The MITRE Corp., CVE-2022-27208 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27208.
- The MITRE Corp., CVE-2022-26311 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26311.
- The MITRE Corp., CVE-2022-24768 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24768.
- The MITRE Corp., CVE-2022-24731, CVE-2022-24730 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24731,https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24730.
- The MITRE Corp., CVE-2022-23652 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23652.
- The MITRE Corp., CVE-2022-23648 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23648.
- The MITRE Corp., CVE-2022-21701 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21701.
- The MITRE Corp., CVE-2022-0811 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0811.
- The MITRE Corp., CVE-2022-0270 [Internet]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0270.
- WIKIPEDIA. Attack Tree [Internet]. Available: https://en.wikipedia.org/wiki/Attack_tree.
- LINDDUN, Privacy threat modeling(LINDDUN) [Internet]. Available: https://www.linddun.org/