Skip to content

docs: add threat model section#4697

Open
paularah wants to merge 4 commits intocilium:mainfrom
paularah:pr/paularah/threat-model
Open

docs: add threat model section#4697
paularah wants to merge 4 commits intocilium:mainfrom
paularah:pr/paularah/threat-model

Conversation

@paularah
Copy link
Copy Markdown
Contributor

this add a threat model covering threat surface analysis, actor profiles, attack scenarios and more.

this add a threat model covering threat surface analysis, actor profiles, attack scenarios and more.

Signed-off-by: Paul Arah <paularah.self@gmail.com>
@paularah paularah requested review from a team and mtardy as code owners February 25, 2026 10:52
@netlify
Copy link
Copy Markdown

netlify Bot commented Feb 25, 2026

Deploy Preview for tetragon ready!

Name Link
🔨 Latest commit 6828643
🔍 Latest deploy log https://app.netlify.com/projects/tetragon/deploys/699f1d6859b4660008ec5791
😎 Deploy Preview https://deploy-preview-4697--tetragon.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@mtardy mtardy added the release-note/docs This PR updates the documentation. label Feb 25, 2026
@mtardy mtardy requested a review from ferozsalam February 25, 2026 15:34
Copy link
Copy Markdown
Member

@mtardy mtardy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So I haven't reviewed the content yet but here a few points already:

  • could we wrap the lines (use gq in vim), we wrap for all the pages in the tetragon docs.
  • the figures after the first one are not rendering properly, see https://deploy-preview-4697--tetragon.netlify.app/docs/threat-model/.
  • I was thinking maybe we could put this under an existing section but actually it might make sense to have this new one 🤔 because not sure it would fit elsewhere

Signed-off-by: Paul Arah <paularah.self@gmail.com>
Signed-off-by: Paul Arah <paularah.self@gmail.com>
Signed-off-by: Paul Arah <paularah.self@gmail.com>
@paularah
Copy link
Copy Markdown
Contributor Author

paularah commented Apr 1, 2026

@ferozsalam you might want to take a look at this.

## Conclusion

While eBPF provides unparalleled visibility and enforcement capabilities, its security is still tied to the integrity of the adjacent environment it operates in, particularly the host operating system and the Kubernetes control plane. Implementing mitigation strategies that encompass the recommended controls in this threat model will ensure Tetragon continues to remain a trusted source of truth. The table below summarizes the attacker profiles, primary vectors, severity, and the primary mitigation.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think the table below is how we should be summarising our recommendations. A lot of the suggestions above are specific to particular use cases, and the table below implies that reducing risk is a matter of implementing the primary mitigation. I think it makes more sense not to have the table - operators should read the entire set of recommendations and assess which potential controls are relevant/useful for them.

- Prometheus metrics collection also benefits from encryption. Enabling TLS on the Prometheus metrics endpoint prevents casual interception of operational metrics, and configuring Prometheus scrapers to use authenticated TLS connections ensures both confidentiality and authenticity of the metrics channel. Users should weigh the operational overhead of managing TLS certificates for metrics collection against the risks associated with metrics disclosure in their specific threat model.


## Operational Security Considerations
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not certain where the best place would be to add this, but a frequent report we receive to the OSS mailing list concerns TOCTOU issues due to hooking on syscalls. It would be good to link to the warning at the top of https://tetragon.io/docs/concepts/tracing-policy/hooks/, to highlight to users that there is a security/visibility risk in using the wrong hook points when writing policies, and that this does not indicate a security vulnerability in Tetragon itself.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

release-note/docs This PR updates the documentation.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants