Kerberos is designed to secure authentication across untrusted networks. It relies on encrypted tickets, shared secrets, and session keys. These artifacts are sensitive data. If attackers capture them, they can impersonate any user the system trusts.
In a typical Kerberos setup, the Key Distribution Center (KDC) stores the long-term keys for every user and service. These keys never change unless you rotate them. Any compromise of the KDC or its database means total system compromise. Protecting these keys is the highest priority.
Ticket Granting Tickets (TGTs) are another critical piece of sensitive data. When a user authenticates, the KDC issues a TGT. This ticket is used to request service tickets without reentering credentials. If an attacker obtains a TGT before it expires, they can access services as that user.
Session keys, embedded in tickets, encrypt communications between clients and services. If session keys leak, encryption is meaningless. Attackers can read and modify traffic at will.