Skip to content
This repository has been archived by the owner on May 11, 2024. It is now read-only.

Latest commit

 

History

History
11 lines (9 loc) · 612 Bytes

security_recommendations.md

File metadata and controls

11 lines (9 loc) · 612 Bytes

Security recommendations

Beside the mandatory requirements and prerequisites there are a few recommendations for Kubernetes setup to ensure secure and reliable experience in the production usage.

  • consider using an overlay network that implements network policy
  • keeping the kubernetes master nodes separate from worker nodes
  • enabling encryption on etcd to protect secrets
  • ensuring the unauthenticated api server ports are blocked
  • consider host-level inbound firewall policy
  • audit your K8S cluster using CIS Security benchmark