Implement/Review the official K8s cluster security guide #22
Labels
documentation
Improvements or additions to documentation
infrastructure
For infrastructure related tasks
Goals:
For the sake of reference and high-level view, here is the Table of Contents of the article:
1.1 Use Transport Layer Security (TLS) for all API traffic
1.2 API Authentication
1.3 API Authorization
3.1 Limiting resource usage on a cluster
3.2 Controlling what privileges containers run with
3.3 Preventing containers from loading unwanted kernel modules
3.4 Restricting network access
3.5 Restricting cloud metadata API access
3.6 Controlling which nodes pods may access
4.1 Restrict access to etcd
4.2 Enable audit logging
4.3 Restrict access to alpha or beta features
4.4 Rotate infrastructure credentials frequently
4.5 Review third party integrations before enabling them
4.6 Encrypt secrets at rest
4.7 Receiving alerts for security updates and reporting vulnerabilities
Things to keep in mind:
The text was updated successfully, but these errors were encountered: