Security (2024)

Concepts for keeping your cloud-native workload secure.

This section of the Kubernetes documentation aims to help you learn to runworkloads more securely, and about the essential aspects of keeping aKubernetes cluster secure.

Kubernetes is based on a cloud-native architecture, and draws on advice from theCNCF about good practice forcloud native information security.

Read Cloud Native Security and Kubernetesfor the broader context about how to secure your cluster and the applications thatyou're running on it.

Kubernetes security mechanisms

Kubernetes includes several APIs and security controls, as well as ways todefine policies that can form part of how you manage information security.

Control plane protection

A key security mechanism for any Kubernetes cluster is tocontrol access to the Kubernetes API.

Kubernetes expects you to configure and use TLS to providedata encryption in transitwithin the control plane, and between the control plane and its clients.You can also enable encryption at restfor the data stored within Kubernetes control plane; this is separate from usingencryption at rest for your own workloads' data, which might also be a good idea.

Secrets

The Secret API provides basic protection forconfiguration values that require confidentiality.

Workload protection

Enforce Pod security standards toensure that Pods and their containers are isolated appropriately. You can also useRuntimeClasses to define custom isolationif you need it.

Network policies let you controlnetwork traffic between Pods, or between Pods and the network outside your cluster.

You can deploy security controls from the wider ecosystem to implement preventativeor detective controls around Pods, their containers, and the images that run in them.

Auditing

Kubernetes audit logging provides asecurity-relevant, chronological set of records documenting the sequence of actionsin a cluster. The cluster audits the activities generated by users, by applicationsthat use the Kubernetes API, and by the control plane itself.

Cloud provider security

Note: Items on this page refer to vendors external to Kubernetes. The Kubernetes project authors aren't responsible for those third-party products or projects. To add a vendor, product or project to this list, read the content guide before submitting a change. More information.

If you are running a Kubernetes cluster on your own hardware or a different cloud provider,consult your documentation for security best practices.Here are links to some of the popular cloud providers' security documentation:

IaaS ProviderLink
Alibaba Cloudhttps://www.alibabacloud.com/trust-center
Amazon Web Serviceshttps://aws.amazon.com/security
Google Cloud Platformhttps://cloud.google.com/security
Huawei Cloudhttps://www.huaweicloud.com/intl/en-us/securecenter/overallsafety
IBM Cloudhttps://www.ibm.com/cloud/security
Microsoft Azurehttps://docs.microsoft.com/en-us/azure/security/azure-security
Oracle Cloud Infrastructurehttps://www.oracle.com/security
VMware vSpherehttps://www.vmware.com/security/hardening-guides

Policies

You can define security policies using Kubernetes-native mechanisms,such as NetworkPolicy(declarative control over network packet filtering) orValidatingAdmissionPolicy (declarative restrictions on what changessomeone can make using the Kubernetes API).

However, you can also rely on policy implementations from the widerecosystem around Kubernetes. Kubernetes provides extension mechanismsto let those ecosystem projects implement their own policy controlson source code review, container image approval, API access controls,networking, and more.

For more information about policy mechanisms and Kubernetes,read Policies.

What's next

Learn about related Kubernetes security topics:

Learn the context:

Get certified:

Read more in this section:

Items on this page refer to third party products or projects that provide functionality required by Kubernetes. The Kubernetes project authors aren't responsible for those third-party products or projects. See the CNCF website guidelines for more details.

You should read the content guide before proposing a change that adds an extra third-party link.

Last modified May 02, 2024 at 3:11 PM PST: Fix typo (ccefac9707)

Security (2024)
Top Articles
Chronicle – Bill Organizer App for iPhone, iPad & Mac
EBSCO Connect
DPhil Research - List of thesis titles
Tesla Supercharger La Crosse Photos
Florida (FL) Powerball - Winning Numbers & Results
Find The Eagle Hunter High To The East
Craigslist Pets Southern Md
Explore Top Free Tattoo Fonts: Style Your Ink Perfectly! 🖌️
Theycallmemissblue
Hca Florida Middleburg Emergency Reviews
Money blog: Domino's withdraws popular dips; 'we got our dream £30k kitchen for £1,000'
Pac Man Deviantart
Sport-News heute – Schweiz & International | aktuell im Ticker
Sprinkler Lv2
Zoe Mintz Adam Duritz
Why Does Lawrence Jones Have Ptsd
Accident On The 210 Freeway Today
Quick Answer: When Is The Zellwood Corn Festival - BikeHike
Tu Pulga Online Utah
Pasco Telestaff
Www Va Lottery Com Result
Loslaten met de Sedona methode
Integer Division Matlab
Target Minute Clinic Hours
Hannaford Weekly Flyer Manchester Nh
Cpt 90677 Reimbursem*nt 2023
Craigslist List Albuquerque: Your Ultimate Guide to Buying, Selling, and Finding Everything - First Republic Craigslist
Helpers Needed At Once Bug Fables
Mosley Lane Candles
Donald Trump Assassination Gold Coin JD Vance USA Flag President FIGHT CIA FBI • $11.73
Boondock Eddie's Menu
Garrison Blacksmith's Bench
Craigslist Com Humboldt
Truckers Report Forums
Pillowtalk Podcast Interview Turns Into 3Some
October 31St Weather
Gold Nugget at the Golden Nugget
Temu Y2K
Td Ameritrade Learning Center
Section 212 at MetLife Stadium
140000 Kilometers To Miles
Jack In The Box Menu 2022
Bartow Qpublic
Pa Legion Baseball
Foxxequeen
2017 Ford F550 Rear Axle Nut Torque Spec
Lawrence E. Moon Funeral Home | Flint, Michigan
Congruent Triangles Coloring Activity Dinosaur Answer Key
Horseneck Beach State Reservation Water Temperature
About us | DELTA Fiber
Diamond Desires Nyc
Latest Posts
Article information

Author: Gregorio Kreiger

Last Updated:

Views: 5737

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Gregorio Kreiger

Birthday: 1994-12-18

Address: 89212 Tracey Ramp, Sunside, MT 08453-0951

Phone: +9014805370218

Job: Customer Designer

Hobby: Mountain biking, Orienteering, Hiking, Sewing, Backpacking, Mushroom hunting, Backpacking

Introduction: My name is Gregorio Kreiger, I am a tender, brainy, enthusiastic, combative, agreeable, gentle, gentle person who loves writing and wants to share my knowledge and understanding with you.