You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/concepts-security.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about security in Azure Kubernetes Service (AKS), including m
4
4
services: container-service
5
5
author: miwithro
6
6
ms.topic: conceptual
7
-
ms.date: 11/11/2021
7
+
ms.date: 01/20/2022
8
8
ms.author: miwithro
9
9
---
10
10
@@ -14,7 +14,7 @@ Container security protects the entire end-to-end pipeline from build to the app
14
14
15
15
The Secure Supply Chain includes the build environment and registry.
16
16
17
-
Kubernetes includes security components, such as *pod security standards* and *Secrets*. Meanwhile, Azure includes components like Active Directory, Microsoft Defender for Cloud, Azure Policy, Azure Key Vault, network security groups and orchestrated cluster upgrades. AKS combines these security components to:
17
+
Kubernetes includes security components, such as *pod security standards* and *Secrets*. Meanwhile, Azure includes components like Active Directory, Microsoft Defender for Containers, Azure Policy, Azure Key Vault, network security groups and orchestrated cluster upgrades. AKS combines these security components to:
18
18
* Provide a complete Authentication and Authorization story.
19
19
* Leverage AKS Built-in Azure Policy to secure your applications.
20
20
* End-to-End insight from build through your application with Microsoft Defender for Containers.
@@ -130,7 +130,7 @@ To limit network traffic between pods in your cluster, AKS offers support for [K
130
130
131
131
## Application Security
132
132
133
-
To protect pods running on AKS leverage [Microsoft Defender for Kubernetes][azure-defender-for-kubernetes] to detect and restrict cyber attacks against your applications running in your pods. Run continual scanning to detect drift in the vulnerability state of your application and implement a "blue/green/canary" process to patch and replace the vulnerable images.
133
+
To protect pods running on AKS leverage [Microsoft Defender for Containers][microsoft-defender-for-containers] to detect and restrict cyber attacks against your applications running in your pods. Run continual scanning to detect drift in the vulnerability state of your application and implement a "blue/green/canary" process to patch and replace the vulnerable images.
134
134
135
135
136
136
## Kubernetes Secrets
@@ -171,7 +171,7 @@ For more information on core Kubernetes and AKS concepts, see:
0 commit comments