There will be scheduled maintenance on Saturday, December 13th and Sunday, December 14th, 2025 between the hours of 11:00pm MT and 5:00am MT. You will be unable to use online and mobile banking during this time. Please contact your nearest branch with any questions. Thank you.

My Account

Misconfigured workload identity could allow a compromised container to impersonate another service and access sensitive data.

Here’s a solid write-up you can use or adapt, focusing on risk assessment examples — whether you’re preparing a compliance document, a blog post, or internal training material. Write-Up: Practical NG2 Risk Assessment Examples Introduction Risk assessment in an NG2 environment (typically referring to next-generation network or security frameworks) goes beyond traditional vulnerability scanning. It requires evaluating dynamic, software-defined, and often cloud-native components. Below are concrete examples of NG2 risk assessments organized by common control families. Example 1: NG2 Access Control Risk Scenario A Kubernetes cluster running microservices with workload identity federation (no traditional service accounts).

In-band telemetry headers leak internal topology and metadata to external networks.

Privileged user bypasses GitOps and manually changes a production NG2 router ACL.

Malicious or unvetted eBPF code loaded into kernel via a popular sidecar image.

© 2025 Westmark Credit Union. All Rights Reserved.     Credit Union Website Design by Avtec Media  Website Design by Avtec Media