Skip to content

Commit 33ac3e6

Browse files
Merge pull request #229272 from miwithro/patch-223
Update concepts-vulnerability-management.md
2 parents b8eef49 + 34484cb commit 33ac3e6

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/aks/concepts-vulnerability-management.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Vulnerability management for Azure Kubernetes Service
33
titleSuffix: Azure Kubernetes Service
44
description: Learn how Microsoft manages security vulnerabilities for Azure Kubernetes Service (AKS) clusters.
55
ms.topic: conceptual
6-
ms.date: 02/24/2023
6+
ms.date: 03/02/2023
77

88
---
99

@@ -47,11 +47,11 @@ In addition to automated scanning, Microsoft discovers and updates vulnerabiliti
4747

4848
### Linux nodes
4949

50-
Each evening, Linux nodes in AKS receive security patches through their distribution security update channel. This behavior is automatically configured, as the nodes are deployed in an AKS cluster. To minimize disruption and potential impact to running workloads, nodes aren't automatically rebooted if a security patch or kernel update requires it. For more information about how to handle node reboots, see [Apply security and kernel updates to nodes in AKS][apply-security-kernel-updates-to-aks-nodes].
50+
Each evening, Linux nodes in AKS receive security patches through their distribution security update channel. This behavior is automatically configured, as the nodes are deployed in an AKS cluster. To minimize disruption and potential impact to running workloads, nodes aren't automatically rebooted if a security patch or kernel update requires it. For more information about how to handle node reboots, see [Apply security and kernel updates to nodes in AKS][apply-security-kernel-updates-to-aks-nodes].
5151

5252
Nightly, we apply security updates to the OS on the node, but the node image used to create nodes for your cluster remains unchanged. If a new Linux node is added to your cluster, the original image is used to create the node. This new node receives all the security and kernel updates available during the automatic assessment performed every night, but remains unpatched until all checks and restarts are complete. You can use node image upgrade to check for and update node images used by your cluster. For more information on node image upgrade, see [Azure Kubernetes Service (AKS) node image upgrade][aks-node-image-upgrade].
5353

54-
For AKS clusters on auto upgrade channel, a *node-image* doesn't pull security updates through the unattended upgrade process. They receive security updates through the weekly node image upgrade.
54+
For AKS clusters on the [OS auto upgrade](https://learn.microsoft.com/azure/aks/auto-upgrade-node-image) channel, the unattended upgrade process is disabled, and the OS nodes will receive security updates through the weekly node image upgrade.
5555

5656
### Windows Server nodes
5757

@@ -84,7 +84,7 @@ Microsoft's goal is to mitigate detected vulnerabilities within a time period ap
8484

8585
## How vulnerabilities and updates are communicated
8686

87-
In general, Microsoft doesn't broadly communicate the release of new patch versions for AKS. However, Microsoft constantly monitors and validates available CVE patches to support them in AKS in a timely manner. If a critical patch is found or user action is required, Microsoft [notifies you to upgrade to the newly available patch][aks-cve-feed].
87+
In general, Microsoft doesn't broadly communicate the release of new patch versions for AKS. However, Microsoft constantly monitors and validates available CVE patches to support them in AKS in a timely manner. If a critical patch is found or user action is required, Microsoft [posts and update on github][aks-cve-feed].
8888

8989
## Security Reporting
9090

@@ -132,4 +132,4 @@ See the overview about [Upgrading Azure Kubernetes Service clusters and node poo
132132
[mrc-create-report]: https://aka.ms/opensource/security/create-report
133133
[msrc-pgp-key-page]: https://aka.ms/opensource/security/pgpkey
134134
[microsoft-security-response-center]: https://aka.ms/opensource/security/msrc
135-
[azure-bounty-program-overview]: https://www.microsoft.com/msrc/bounty-microsoft-azure
135+
[azure-bounty-program-overview]: https://www.microsoft.com/msrc/bounty-microsoft-azure

0 commit comments

Comments
 (0)