Skip to content

Commit b1123c7

Browse files
committed
edited per review of changes by PM
1 parent 755e429 commit b1123c7

File tree

1 file changed

+36
-29
lines changed

1 file changed

+36
-29
lines changed
Lines changed: 36 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,37 @@
11
---
2-
title: Security Update Management for Azure Kubernetes Service
2+
title: Security Patch Management for Azure Kubernetes Service
33
titleSuffix: Azure Kubernetes Service
4-
description: Learn about our best practices for security updates for your Azure Kubernetes Service (AKS) cluster.
5-
services: container-service
4+
description: Learn about our best practices to manage security updates for your Azure Kubernetes Service (AKS) cluster.
65
ms.topic: conceptual
7-
ms.date: 02/23/2023
6+
ms.date: 02/24/2023
87

98
---
109

1110
# Security Patch Management for Azure Kubernetes Service (AKS)
1211

1312
This article describes how Microsoft manages security vulnerabilities and security updates (also referred to as patches), for Azure Kubernetes Service (AKS) clusters.
1413

15-
# How vulnerabilities are discovered
14+
## How vulnerabilities are discovered
1615

1716
Microsoft identifies and patches vulnerabilities and missing security updates for the following components:
1817

19-
- AKS Container Images:
18+
- AKS Container Images
2019

21-
- Ubuntu OS 18.04 & 22.04 Worker Nodes: Canonical provides Microsoft with OS builds that have all available security updates applied.
20+
- Ubuntu operating system 18.04 and 22.04 worker nodes: Canonical provides Microsoft with OS builds that have all available security updates applied.
2221

23-
- Windows 2022 OS Worker Nodes: The Windows OS is patched every month (second Tuesday of each month). SLAs should be the same as per their support contract and severity.
22+
- Windows Server 2022 OS worker nodes: The Windows Server operating system is patched on the second Tuesday of every month. SLAs should be the same as per their support contract and severity.
2423

2524
- Mariner OS Nodes: Mariner provides AKS with OS builds that have all available security updates applied.
2625

2726
## AKS Container Images
2827

29-
While the bulk of the code running in AKS is owned and maintained by CNCF, the Azure Container Upstream team takes responsibility for building the open-source packages that we deploy on AKS. This provides complete ownership of the build, scan, sign, validate, and hotfix process and control over the binaries in container images which enables us to both establish a software supply chain over the binary as well as patch the software as needed.
28+
While the bulk of the code running in AKS is owned and maintained by the [Cloud Native Computing Foundation][cloud-native-computing-foundation] (CNCF), the Azure Container Upstream team takes responsibility for building the open-source packages that we deploy on AKS. This provides complete ownership of the build, scan, sign, validate, and hotfix process and control over the binaries in container images. By us having responsibility for building the open-source packages deployed on AKS, it enables us to both establish a software supply chain over the binary, as well as patch the software as needed.
3029

31-
Microsoft has invested in engineers (the Azure Container Upstream team) and infrastructure in the broader Kubernetes ecosystem to help build the future of cloud-native compute in the wider CNCF community. A notable example of this is the donation of engineering time to help manage Kubernetes releases. This work not only ensures the quality of every Kubernetes release for the world, but also enabled AKS to be the fastest to get new Kubernetes releases out into production for several years. In some cases, ahead of other clouds by multiple months. Microsoft collaborates with other industry partners in the Kubernetes security organization (the Security Response Committee (SRC)), receiving, triaging, and patching embargoed security vulnerabilities before they are announced to the public. This commitment helps ensure that Kubernetes is secure for the entire world, but also enables AKS to patch and respond to vulnerabilities faster to keep our customers safe as it is part of the Kubernetes Distributors List. In addition to Kubernetes, Microsoft has signed up to receive pre-release notifications for software vulnerabilities for products such as Envoy, container runtimes, and many other open-source projects.
30+
Microsoft has invested in engineers (the Azure Container Upstream team) and infrastructure in the broader Kubernetes ecosystem to help build the future of cloud-native compute in the wider CNCF community. A notable example of this is the donation of engineering time to help manage Kubernetes releases. This work not only ensures the quality of every Kubernetes release for the world, but also enables AKS quickly get new Kubernetes releases out into production for several years. In some cases, ahead of other cloud providers by several months. Microsoft collaborates with other industry partners in the Kubernetes security organization, for example the Security Response Committee (SRC), receiving, prioritizing, and patching embargoed security vulnerabilities before they are announced to the public. This commitment ensures Kubernetes is secure for everyone, as well as enable AKS to patch and respond to vulnerabilities faster to keep our customers safe. In addition to Kubernetes, Microsoft has signed up to receive pre-release notifications for software vulnerabilities for products such as Envoy, container runtimes, and many other open-source projects.
3231

33-
Microsoft scans container images using static analysis to discover vulnerabilities and missing updates in Kubernetes and Microsoft-managed containers. If fixes are available, the scanner automatically begins the updating and release process.
32+
Microsoft scans container images using static analysis to discover vulnerabilities and missing updates in Kubernetes and Microsoft-managed containers. If fixes are available, the scanner automatically begins the update and release process.
3433

35-
In addition to automated scanning, Microsoft discovers and updates vulnerabilities unknown to scanners in the following ways.
34+
In addition to automated scanning, Microsoft discovers and updates vulnerabilities unknown to scanners in the following ways:
3635

3736
* Microsoft performs its own audits, penetration testing, and vulnerability discovery across all AKS platforms. Specialized teams inside Microsoft and trusted third-party security vendors conduct their own attack research.
3837

@@ -45,18 +44,20 @@ In addition to automated scanning, Microsoft discovers and updates vulnerabiliti
4544
## Worker Nodes
4645

4746
### Linux nodes
48-
Each evening, Linux nodes in AKS get security patches through their distro security update channel. This behavior is automatically configured as the nodes are deployed in an AKS cluster. To minimize disruption and potential impact to running workloads, nodes are not automatically rebooted if a security patch or kernel update requires it. For more information about how to handle node reboots, see Apply security and kernel updates to nodes in AKS.
4947

50-
Nightly updates apply security updates to the OS on the node, but the node image used to create nodes for your cluster remains unchanged. If a new Linux node is added to your cluster, the original image is used to create the node. This new node will receive all the security and kernel updates available during the automatic check every night but will remain unpatched until all checks and restarts are complete. You can use node image upgrade to check for and update node images used by your cluster. For more details on node image upgrade, see Azure Kubernetes Service (AKS) node image upgrade.
48+
Each evening, Linux nodes in AKS receive security patches through their distrobution security update channel. This behavior is automatically configured, as the nodes are deployed in an AKS cluster. To minimize disruption and potential impact to running workloads, nodes are not automatically rebooted if a security patch or kernel update requires it. For more information about how to handle node reboots, see [Apply security and kernel updates to nodes in AKS][apply-security-kernel-updates-to-aks-nodes].
5149

52-
For AKS clusters on auto upgrade channel "node-image" will not pull security updates through unattended upgrade. They will get security updates through the weekly node image upgrade.
50+
Nightly, we apply security updates to the OS on the node, but the node image used to create nodes for your cluster remains unchanged. If a new Linux node is added to your cluster, the original image is used to create the node. This new node receives all the security and kernel updates available during the automatic assessment performed every night, but remains unpatched until all checks and restarts are complete. You can use node image upgrade to check for and update node images used by your cluster. For more details on node image upgrade, see [Azure Kubernetes Service (AKS) node image upgrade][aks-node-image-upgrade].
51+
52+
For AKS clusters on auto upgrade channel, a *node-image* doesn't pull security updates through the unattended upgrade process. They receive security updates through the weekly node image upgrade.
5353

5454
### Windows Server nodes
55-
For Windows Server nodes, Windows Update doesn't automatically run and apply the latest updates. Schedule Windows Server node pool upgrades in your AKS cluster around the regular Windows Update release cycle and your own validation process. This upgrade process creates nodes that run the latest Windows Server image and patches, then removes the older nodes. For more information on this process, see Upgrade a node pool in AKS.
55+
56+
For Windows Server nodes, Windows Update doesn't automatically run and apply the latest updates. Schedule Windows Server node pool upgrades in your AKS cluster around the regular Windows Update release cycle and your own update management process. This upgrade process creates nodes that run the latest Windows Server image and patches, then removes the older nodes. For more information on this process, see [Upgrade a node pool in AKS][upgrade-node-pool-in-aks].
5657

5758
## How vulnerabilities are classified
5859

59-
Microsoft makes large investments in security hardening the entire stack, including the OS, container, Kubernetes, and network layers, in addition to setting good defaults, security-hardened configurations, and managed components. Combined, these efforts help to reduce the impact and likelihood of vulnerabilities.
60+
Microsoft makes large investments in security hardening the entire stack, including the OS, container, Kubernetes, and network layers. In addition to setting good defaults, security-hardened configurations, and managed components. Combined, these efforts help to reduce the impact and likelihood of vulnerabilities.
6061

6162
The AKS team classifies vulnerabilities according to the Kubernetes vulnerability scoring system. Classifications consider many factors including AKS configuration and security hardening. Because of these factors and the investments AKS makes in security, AKS vulnerability classifications might differ from other classification sources.
6263

@@ -85,41 +86,47 @@ In general, Microsoft does not broadly communicate the release of new patch vers
8586

8687
## Security Reporting
8788

88-
Please report Security issues to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://aka.ms/opensource/security/create-report).
89+
You can report a security issue to the Microsoft Security Response Center (MSRC), by [creating a vulnerability report][mrc-create-report].
8990

90-
If you prefer to submit without logging in, send email to [[email protected]](mailto:[email protected]). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://aka.ms/opensource/security/pgpkey).
91+
If you prefer to submit a report without logging in to the tool, send email to [[email protected]](mailto:[email protected]). If possible, encrypt your message with our PGP key by downloading it from the [Microsoft Security Response Center PGP Key page][msrc-pgp-key-page].
9192

92-
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://aka.ms/opensource/security/msrc).
93+
You should receive a response within 24 hours. If for some reason you don't, follow up with an email to ensure we received your original message. For more information, go to the [Microsoft Security Response Center][microsoft-security-response-center].
9394

94-
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
95+
Include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
9596

96-
* Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
97+
* Type of issue (for example, buffer overflow, SQL injection, cross-site scripting, etc.)
9798
* Full paths of source file(s) related to the manifestation of the issue
9899
* The location of the affected source code (tag/branch/commit or direct URL)
99100
* Any special configuration required to reproduce the issue
100101
* Step-by-step instructions to reproduce the issue
101102
* Proof-of-concept or exploit code (if possible)
102-
* Impact of the issue, including how an attacker might exploit the issue
103+
* Impact of the issue, including how an attacker might exploit the issue.
103104

104-
This information will help us triage your report more quickly.
105+
This information helps us triage your reported security issue quicker.
105106

106-
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program](https://aka.ms/opensource/security/bounty) page for more details about our active programs.
107+
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program][microsoft-bug-bounty-program-overview] page for more details about our active programs.
107108

108109
### Policy
109110

110-
Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://aka.ms/opensource/security/cvd).
111-
111+
Microsoft follows the principle of [Coordinated Vulnerability Disclosure][coordinated-vulnerability-disclosure].
112112

113113
## Next steps
114114

115-
See the overview about [Upgrading Azure Kubernetes Service clusters and node pools][upgrade-aks-clusters-nodes]
115+
See the overview about [Upgrading Azure Kubernetes Service clusters and node pools][upgrade-aks-clusters-nodes].
116116

117117
<!-- LINKS - internal -->
118118
[upgrade-aks-clusters-nodes]: upgrade.md
119119
[microsoft-azure-fedramp-high]: /azure/azure-government/compliance/azure-services-in-fedramp-auditscope#azure-government-services-by-audit-scope
120+
[apply-security-kernel-updates-to-aks-nodes]: node-updates-kured.md
121+
[aks-node-image-upgrade]: node-image-upgrade.md
122+
[upgrade-node-pool-in-aks]: use-multiple-node-pools.md#upgrade-a-node-pool
120123

121124
<!-- LINKS - external -->
122-
[azure-bounty-program-overview]: https://www.microsoft.com/en-us/msrc/bounty-microsoft-azure
125+
[microsoft-bug-bounty-program-overview]: https://aka.ms/opensource/security/bounty
126+
[coordinated-vulnerability-disclosure]: https://aka.ms/opensource/security/cvd
123127
[kubernetes-security-response-committee]: https://github.com/kubernetes/committee-security-response
124128
[cloud-native-computing-foundation]: https://www.cncf.io/
125129
[aks-cve-feed]: https://github.com/Azure/AKS/issues?q=is%3Aissue+is%3Aopen+cve
130+
[mrc-create-report]: https://aka.ms/opensource/security/create-report
131+
[msrc-pgp-key-page]: https://aka.ms/opensource/security/pgpkey
132+
[microsoft-security-response-center]: https://aka.ms/opensource/security/msrc

0 commit comments

Comments
 (0)