Kontra OWASP Top 10 for Kubernetes
-
Broken Authentication Mechanisms
NEW -
Inadequate Logging and Monitoring
NEW -
Insecure Workload Configurations
NEW -
Lack of Centralized Policy Enforcement
NEW -
Misconfigured Cluster Components
NEW -
Missing Network Segmentation Controls
NEW -
Overly Permissive RBAC Configurations
NEW -
Secrets Management Failure
NEW -
Supply Chain Vulnerabilities
NEW -
Vulnerable Kubernetes Components - Security Audit
NEW