Data destruction
Attackers may attempt to destroy data and resources in the cluster. This includes deleting deployments, configurations, storage, and compute resources.
Mitigations
ID | Mitigation | Description |
---|---|---|
MS-M9030 | Use Cloud Storage Provider | Use Cloud Storage provider to persist application data. |
MS-M9031 | Implement Data Backup Strategy | Backup pod mounted volumes for critical workloads. |