Replies: 1 comment
-
Another aspect of the control plane is the container runtime (e.g. CRI-O). It requires network access to registries in order to download container images. That connectivity is not part of the KubeAPI. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Welcoming comments
General idea
In line with our goal of creating a "best practices" framework for Kubernetes CNF implementations, I would like to create another "best practice" document.
I want to address Kubernetes network security and isolation in high level with two major parts:
Limit access to KubeAPI
The KubeAPI is the main gateway to a cluster and main target of any attacker. There are two components of protecting this API:
Make sure Kubernetes system components are using secure communication
Attackers who are able to access the network in which the Kubernetes cluster is running can connect and manipulate system components or eavesdrop the communication between those components.
Kubernetes control plane components like API server, ETCD, controller-manager and
scheduler should be configured to use and enforce TLS with bilateral certificate based authentication.
Beta Was this translation helpful? Give feedback.
All reactions