From the course: Threat Modeling: Tampering in Depth
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Tampering with local storage
From the course: Threat Modeling: Tampering in Depth
Tampering with local storage
- [Narrator] We've talked about libraries and libraries are an important case. But don't limit your thinking to libraries. Executables can be tampered with. Lambda functions can be tampered with. Containers can be tampered with. Kubernetes can't be tampered with because Kubernetes is magic. Actually, it's not that magical. It can be tampered with. Someone who gets privileged access can tamper with files. Those can be data, they can be configuration files. Modifying configuration files can be as impactful as modifying the code. It's easier too. File tampering is easiest to visualize on the local system but all files are subject to tampering.