Security (2024)

Concepts for keeping your cloud-native workload secure.

This section of the Kubernetes documentation aims to help you learn to runworkloads more securely, and about the essential aspects of keeping aKubernetes cluster secure.

Kubernetes is based on a cloud-native architecture, and draws on advice from theCNCF about good practice forcloud native information security.

Read Cloud Native Security and Kubernetesfor the broader context about how to secure your cluster and the applications thatyou're running on it.

Kubernetes security mechanisms

Kubernetes includes several APIs and security controls, as well as ways todefine policies that can form part of how you manage information security.

Control plane protection

A key security mechanism for any Kubernetes cluster is tocontrol access to the Kubernetes API.

Kubernetes expects you to configure and use TLS to providedata encryption in transitwithin the control plane, and between the control plane and its clients.You can also enable encryption at restfor the data stored within Kubernetes control plane; this is separate from usingencryption at rest for your own workloads' data, which might also be a good idea.

Secrets

The Secret API provides basic protection forconfiguration values that require confidentiality.

Workload protection

Enforce Pod security standards toensure that Pods and their containers are isolated appropriately. You can also useRuntimeClasses to define custom isolationif you need it.

Network policies let you controlnetwork traffic between Pods, or between Pods and the network outside your cluster.

You can deploy security controls from the wider ecosystem to implement preventativeor detective controls around Pods, their containers, and the images that run in them.

Auditing

Kubernetes audit logging provides asecurity-relevant, chronological set of records documenting the sequence of actionsin a cluster. The cluster audits the activities generated by users, by applicationsthat use the Kubernetes API, and by the control plane itself.

Cloud provider security

Note: Items on this page refer to vendors external to Kubernetes. The Kubernetes project authors aren't responsible for those third-party products or projects. To add a vendor, product or project to this list, read the content guide before submitting a change. More information.

If you are running a Kubernetes cluster on your own hardware or a different cloud provider,consult your documentation for security best practices.Here are links to some of the popular cloud providers' security documentation:

IaaS ProviderLink
Alibaba Cloudhttps://www.alibabacloud.com/trust-center
Amazon Web Serviceshttps://aws.amazon.com/security
Google Cloud Platformhttps://cloud.google.com/security
Huawei Cloudhttps://www.huaweicloud.com/intl/en-us/securecenter/overallsafety
IBM Cloudhttps://www.ibm.com/cloud/security
Microsoft Azurehttps://docs.microsoft.com/en-us/azure/security/azure-security
Oracle Cloud Infrastructurehttps://www.oracle.com/security
VMware vSpherehttps://www.vmware.com/security/hardening-guides

Policies

You can define security policies using Kubernetes-native mechanisms,such as NetworkPolicy(declarative control over network packet filtering) orValidatingAdmissionPolicy (declarative restrictions on what changessomeone can make using the Kubernetes API).

However, you can also rely on policy implementations from the widerecosystem around Kubernetes. Kubernetes provides extension mechanismsto let those ecosystem projects implement their own policy controlson source code review, container image approval, API access controls,networking, and more.

For more information about policy mechanisms and Kubernetes,read Policies.

What's next

Learn about related Kubernetes security topics:

Learn the context:

Get certified:

Read more in this section:

Items on this page refer to third party products or projects that provide functionality required by Kubernetes. The Kubernetes project authors aren't responsible for those third-party products or projects. See the CNCF website guidelines for more details.

You should read the content guide before proposing a change that adds an extra third-party link.

Last modified May 02, 2024 at 3:11 PM PST: Fix typo (ccefac9707)

Security (2024)
Top Articles
21 Best Forex Brokers in Norway for September 2024
New CFO of the Future Report Finds Expectations Accelerating for CFOs | IMA
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Gregorio Kreiger

Last Updated:

Views: 5737

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Gregorio Kreiger

Birthday: 1994-12-18

Address: 89212 Tracey Ramp, Sunside, MT 08453-0951

Phone: +9014805370218

Job: Customer Designer

Hobby: Mountain biking, Orienteering, Hiking, Sewing, Backpacking, Mushroom hunting, Backpacking

Introduction: My name is Gregorio Kreiger, I am a tender, brainy, enthusiastic, combative, agreeable, gentle, gentle person who loves writing and wants to share my knowledge and understanding with you.