Skip to content

Commit b0d9ee5

Browse files
author
Justin
committed
add linux only
1 parent 3aa7f69 commit b0d9ee5

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/aks/security-hardened-vm-host-image.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,14 @@ ms.custom: mvc
1313

1414
Azure Kubernetes Service (AKS) is a secure service compliant with SOC, ISO, PCI DSS, and HIPAA standards. This article covers the security hardening applied to AKS virtual machine hosts. For more information about AKS security, see [Security concepts for applications and clusters in Azure Kubernetes Service (AKS)](https://docs.microsoft.com/azure/aks/concepts-security).
1515

16+
> [!NOTE] This document is scoped to Linux agents in AKS only.
17+
1618
AKS clusters are deployed on host virtual machines, which run a security optimized OS which is utilized for containers running on AKS. This host OS is based on an **Ubuntu 16.04.LTS** image with additional security hardening and optimizations applied (see Security hardening details).
1719

1820
The goal of the security hardened host OS is to reduce the surface area of attack and optimize for the deployment of containers in a secure manner.
1921

2022
> [!Important]
21-
> The security hardened OS is NOT CIS benchmarked. While there are overlaps with CIS benchmarks, the goal is not to be CIS-compliant. The goal for host OS hardening is to converge on a level of security consistent with Microsofts own internal host security standards.
23+
> The security hardened OS is NOT CIS benchmarked. While there are overlaps with CIS benchmarks, the goal is not to be CIS-compliant. The goal for host OS hardening is to converge on a level of security consistent with Microsoft's own internal host security standards.
2224
2325
## Security hardening features
2426

0 commit comments

Comments
 (0)