Data destruction
Attackers may attempt to destroy data and resources in the cluster. This includes deleting deployments, configurations, storage, and compute resources.
Mitigations
| ID | Mitigation | Description |
|---|---|---|
| MS-M9030 | Use Cloud Storage Provider | Use Cloud Storage provider to persist application data. |
| MS-M9031 | Implement Data Backup Strategy | Backup pod mounted volumes for critical workloads. |