You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Security Update Management for Azure Kubernetes Service
2
+
title: Security Patch Management for Azure Kubernetes Service
3
3
titleSuffix: Azure Kubernetes Service
4
-
description: Learn about our best practices for security updates for your Azure Kubernetes Service (AKS) cluster.
5
-
services: container-service
4
+
description: Learn about our best practices to manage security updates for your Azure Kubernetes Service (AKS) cluster.
6
5
ms.topic: conceptual
7
-
ms.date: 02/23/2023
6
+
ms.date: 02/24/2023
8
7
9
8
---
10
9
11
10
# Security Patch Management for Azure Kubernetes Service (AKS)
12
11
13
12
This article describes how Microsoft manages security vulnerabilities and security updates (also referred to as patches), for Azure Kubernetes Service (AKS) clusters.
14
13
15
-
# How vulnerabilities are discovered
14
+
##How vulnerabilities are discovered
16
15
17
16
Microsoft identifies and patches vulnerabilities and missing security updates for the following components:
18
17
19
-
- AKS Container Images:
18
+
- AKS Container Images
20
19
21
-
- Ubuntu OS 18.04 & 22.04 Worker Nodes: Canonical provides Microsoft with OS builds that have all available security updates applied.
20
+
- Ubuntu operating system 18.04 and 22.04 worker nodes: Canonical provides Microsoft with OS builds that have all available security updates applied.
22
21
23
-
- Windows 2022 OS Worker Nodes: The Windows OS is patched every month (second Tuesday of each month). SLAs should be the same as per their support contract and severity.
22
+
- Windows Server 2022 OS worker nodes: The Windows Server operating system is patched on the second Tuesday of every month. SLAs should be the same as per their support contract and severity.
24
23
25
24
- Mariner OS Nodes: Mariner provides AKS with OS builds that have all available security updates applied.
26
25
27
26
## AKS Container Images
28
27
29
-
While the bulk of the code running in AKS is owned and maintained by CNCF, the Azure Container Upstream team takes responsibility for building the open-source packages that we deploy on AKS. This provides complete ownership of the build, scan, sign, validate, and hotfix process and control over the binaries in container images which enables us to both establish a software supply chain over the binary as well as patch the software as needed.
28
+
While the bulk of the code running in AKS is owned and maintained by the [Cloud Native Computing Foundation][cloud-native-computing-foundation] (CNCF), the Azure Container Upstream team takes responsibility for building the open-source packages that we deploy on AKS. This provides complete ownership of the build, scan, sign, validate, and hotfix process and control over the binaries in container images. By us having responsibility for building the open-source packages deployed on AKS, it enables us to both establish a software supply chain over the binary, as well as patch the software as needed.
30
29
31
-
Microsoft has invested in engineers (the Azure Container Upstream team) and infrastructure in the broader Kubernetes ecosystem to help build the future of cloud-native compute in the wider CNCF community. A notable example of this is the donation of engineering time to help manage Kubernetes releases. This work not only ensures the quality of every Kubernetes release for the world, but also enabled AKS to be the fastest to get new Kubernetes releases out into production for several years. In some cases, ahead of other clouds by multiple months. Microsoft collaborates with other industry partners in the Kubernetes security organization (the Security Response Committee (SRC)), receiving, triaging, and patching embargoed security vulnerabilities before they are announced to the public. This commitment helps ensure that Kubernetes is secure for the entire world, but also enables AKS to patch and respond to vulnerabilities faster to keep our customers safe as it is part of the Kubernetes Distributors List. In addition to Kubernetes, Microsoft has signed up to receive pre-release notifications for software vulnerabilities for products such as Envoy, container runtimes, and many other open-source projects.
30
+
Microsoft has invested in engineers (the Azure Container Upstream team) and infrastructure in the broader Kubernetes ecosystem to help build the future of cloud-native compute in the wider CNCF community. A notable example of this is the donation of engineering time to help manage Kubernetes releases. This work not only ensures the quality of every Kubernetes release for the world, but also enables AKS quickly get new Kubernetes releases out into production for several years. In some cases, ahead of other cloud providers by several months. Microsoft collaborates with other industry partners in the Kubernetes security organization, for example the Security Response Committee (SRC), receiving, prioritizing, and patching embargoed security vulnerabilities before they are announced to the public. This commitment ensures Kubernetes is secure for everyone, as well as enable AKS to patch and respond to vulnerabilities faster to keep our customers safe. In addition to Kubernetes, Microsoft has signed up to receive pre-release notifications for software vulnerabilities for products such as Envoy, container runtimes, and many other open-source projects.
32
31
33
-
Microsoft scans container images using static analysis to discover vulnerabilities and missing updates in Kubernetes and Microsoft-managed containers. If fixes are available, the scanner automatically begins the updating and release process.
32
+
Microsoft scans container images using static analysis to discover vulnerabilities and missing updates in Kubernetes and Microsoft-managed containers. If fixes are available, the scanner automatically begins the update and release process.
34
33
35
-
In addition to automated scanning, Microsoft discovers and updates vulnerabilities unknown to scanners in the following ways.
34
+
In addition to automated scanning, Microsoft discovers and updates vulnerabilities unknown to scanners in the following ways:
36
35
37
36
* Microsoft performs its own audits, penetration testing, and vulnerability discovery across all AKS platforms. Specialized teams inside Microsoft and trusted third-party security vendors conduct their own attack research.
38
37
@@ -45,18 +44,20 @@ In addition to automated scanning, Microsoft discovers and updates vulnerabiliti
45
44
## Worker Nodes
46
45
47
46
### Linux nodes
48
-
Each evening, Linux nodes in AKS get security patches through their distro security update channel. This behavior is automatically configured as the nodes are deployed in an AKS cluster. To minimize disruption and potential impact to running workloads, nodes are not automatically rebooted if a security patch or kernel update requires it. For more information about how to handle node reboots, see Apply security and kernel updates to nodes in AKS.
49
47
50
-
Nightly updates apply security updates to the OS on the node, but the node image used to create nodes for your cluster remains unchanged. If a new Linux node is added to your cluster, the original image is used to create the node. This new node will receive all the security and kernel updates available during the automatic check every night but will remain unpatched until all checks and restarts are complete. You can use node image upgrade to check for and update node images used by your cluster. For more details on node image upgrade, see Azure Kubernetes Service (AKS) node image upgrade.
48
+
Each evening, Linux nodes in AKS receive security patches through their distrobution security update channel. This behavior is automatically configured, as the nodes are deployed in an AKS cluster. To minimize disruption and potential impact to running workloads, nodes are not automatically rebooted if a security patch or kernel update requires it. For more information about how to handle node reboots, see [Apply security and kernel updates to nodes in AKS][apply-security-kernel-updates-to-aks-nodes].
51
49
52
-
For AKS clusters on auto upgrade channel "node-image" will not pull security updates through unattended upgrade. They will get security updates through the weekly node image upgrade.
50
+
Nightly, we apply security updates to the OS on the node, but the node image used to create nodes for your cluster remains unchanged. If a new Linux node is added to your cluster, the original image is used to create the node. This new node receives all the security and kernel updates available during the automatic assessment performed every night, but remains unpatched until all checks and restarts are complete. You can use node image upgrade to check for and update node images used by your cluster. For more details on node image upgrade, see [Azure Kubernetes Service (AKS) node image upgrade][aks-node-image-upgrade].
51
+
52
+
For AKS clusters on auto upgrade channel, a *node-image* doesn't pull security updates through the unattended upgrade process. They receive security updates through the weekly node image upgrade.
53
53
54
54
### Windows Server nodes
55
-
For Windows Server nodes, Windows Update doesn't automatically run and apply the latest updates. Schedule Windows Server node pool upgrades in your AKS cluster around the regular Windows Update release cycle and your own validation process. This upgrade process creates nodes that run the latest Windows Server image and patches, then removes the older nodes. For more information on this process, see Upgrade a node pool in AKS.
55
+
56
+
For Windows Server nodes, Windows Update doesn't automatically run and apply the latest updates. Schedule Windows Server node pool upgrades in your AKS cluster around the regular Windows Update release cycle and your own update management process. This upgrade process creates nodes that run the latest Windows Server image and patches, then removes the older nodes. For more information on this process, see [Upgrade a node pool in AKS][upgrade-node-pool-in-aks].
56
57
57
58
## How vulnerabilities are classified
58
59
59
-
Microsoft makes large investments in security hardening the entire stack, including the OS, container, Kubernetes, and network layers, in addition to setting good defaults, security-hardened configurations, and managed components. Combined, these efforts help to reduce the impact and likelihood of vulnerabilities.
60
+
Microsoft makes large investments in security hardening the entire stack, including the OS, container, Kubernetes, and network layers. In addition to setting good defaults, security-hardened configurations, and managed components. Combined, these efforts help to reduce the impact and likelihood of vulnerabilities.
60
61
61
62
The AKS team classifies vulnerabilities according to the Kubernetes vulnerability scoring system. Classifications consider many factors including AKS configuration and security hardening. Because of these factors and the investments AKS makes in security, AKS vulnerability classifications might differ from other classification sources.
62
63
@@ -85,41 +86,47 @@ In general, Microsoft does not broadly communicate the release of new patch vers
85
86
86
87
## Security Reporting
87
88
88
-
Please report Security issues to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://aka.ms/opensource/security/create-report).
89
+
You can report a security issue to the Microsoft Security Response Center (MSRC), by [creating a vulnerability report][mrc-create-report].
89
90
90
-
If you prefer to submit without logging in, send email to [[email protected]](mailto:[email protected]). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://aka.ms/opensource/security/pgpkey).
91
+
If you prefer to submit a report without logging in to the tool, send email to [[email protected]](mailto:[email protected]). If possible, encrypt your message with our PGP key by downloading it from the [Microsoft Security Response Center PGP Key page][msrc-pgp-key-page].
91
92
92
-
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://aka.ms/opensource/security/msrc).
93
+
You should receive a response within 24 hours. If for some reason you don't, follow up with an email to ensure we received your original message. For more information, go to the [Microsoft Security Response Center][microsoft-security-response-center].
93
94
94
-
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
95
+
Include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
95
96
96
-
* Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
97
+
* Type of issue (for example, buffer overflow, SQL injection, cross-site scripting, etc.)
97
98
* Full paths of source file(s) related to the manifestation of the issue
98
99
* The location of the affected source code (tag/branch/commit or direct URL)
99
100
* Any special configuration required to reproduce the issue
100
101
* Step-by-step instructions to reproduce the issue
101
102
* Proof-of-concept or exploit code (if possible)
102
-
* Impact of the issue, including how an attacker might exploit the issue
103
+
* Impact of the issue, including how an attacker might exploit the issue.
103
104
104
-
This information will help us triage your report more quickly.
105
+
This information helps us triage your reported security issue quicker.
105
106
106
-
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program](https://aka.ms/opensource/security/bounty) page for more details about our active programs.
107
+
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program][microsoft-bug-bounty-program-overview] page for more details about our active programs.
107
108
108
109
### Policy
109
110
110
-
Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://aka.ms/opensource/security/cvd).
111
-
111
+
Microsoft follows the principle of [Coordinated Vulnerability Disclosure][coordinated-vulnerability-disclosure].
112
112
113
113
## Next steps
114
114
115
-
See the overview about [Upgrading Azure Kubernetes Service clusters and node pools][upgrade-aks-clusters-nodes]
115
+
See the overview about [Upgrading Azure Kubernetes Service clusters and node pools][upgrade-aks-clusters-nodes].
0 commit comments