Tag

risk

0 views collected around this technical thread.

Beike Product & Technology
Beike Product & Technology
Jan 12, 2024 · Information Security

Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System

This article examines how misconfigured Kubernetes RBAC permissions can lead to privilege escalation across clusters, presents a graph‑based model to represent users, roles, and authorities, and provides code examples and Cypher queries for detecting and visualizing high‑risk permission paths.

KubernetesRBACSecurity
0 likes · 16 min read
Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System
IT Architects Alliance
IT Architects Alliance
Aug 14, 2021 · Backend Development

When to Adopt Microservices: Evaluation, Risks, and Best Practices

This article examines the trade‑offs of microservice architecture, comparing it with monolithic design, and provides practical guidance on when to transition, how to assess technical and team readiness, and what risks and splitting strategies to consider.

Microservicesarchitecturebackend
0 likes · 17 min read
When to Adopt Microservices: Evaluation, Risks, and Best Practices