Search⌘ K

Repudiation

Explore how non-repudiation enhances Kubernetes security by proving who performed actions, when, and how. Learn to use audit logs from the API server, container runtimes, and nodes, and understand the importance of centralized, secure log storage for effective threat modeling and mitigation.

We'll cover the following...

At a very high level, repudiation creates doubt about something. Non-repudiation provides proof about something. In the context of information security, non-repudiation is proving certain individuals carried out certain actions.

Digging a little deeper, non-repudiation includes the ability to prove:

  • What happened?

  • When it happened? ...