🛡️
CTHFM: Kubernetes
Ctrlk
  • Welcome
  • Kubernetes Fundamentals
    • Kubernetes Components
    • Kubectl
    • MiniKube
  • Kubernetes Logging
    • Kubernetes Logging Overview
    • Audit Logs
    • Node Logs
    • Pod Logs
    • Application Logs
    • Importance of Logging
    • Types of Logs
    • Collecting and Aggregating Logs
    • Monitoring and Alerting
    • Log Parsing and Enrichment
    • Security Considerations in Logging
    • Best Practices
    • Kubernetes Logging Architecture
  • Threat Hunting
    • Threat Hunting Introduction
    • What Makes Kubernetes Threat Hunting Unique
    • Threat Hunting Process
    • Pyramid of Pain
    • Threat Frameworks
      • MITRE Containers Matrix
      • Microsoft Threat for Kubernetes
    • Kubernetes Behavioral Analysis and Anomaly Detection
    • Threat Hunting Ideas
    • Threat Hunting Labs
  • Security Tools
    • Falco
    • Open Policy Agent (OPA)
    • Kube-Bench
    • Kube-Hunter
    • Trivy
    • Security Best Practices and Documentation
  • Open Source Tools
    • Cloud Native Computing Foundation (CNCF)
  • Infrastructure as Code
    • Kubernetes and Terraform
    • Helm
Powered by GitBook
On this page
  1. Threat Hunting

Threat Frameworks

MITRE Containers MatrixMicrosoft Threat for Kubernetes
PreviousPyramid of PainNextMITRE Containers Matrix