You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/concepts-security.md
+3-16Lines changed: 3 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,31 +15,18 @@ Container security protects the entire end-to-end pipeline from build to the app
15
15
The Secure Supply Chain includes the build environment and registry.
16
16
17
17
Kubernetes includes security components, such as *pod security standards* and *Secrets*. Meanwhile, Azure includes components like Active Directory, Microsoft Defender for Containers, Azure Policy, Azure Key Vault, network security groups and orchestrated cluster upgrades. AKS combines these security components to:
18
+
18
19
* Provide a complete Authentication and Authorization story.
19
20
* Leverage AKS Built-in Azure Policy to secure your applications.
20
21
* End-to-End insight from build through your application with Microsoft Defender for Containers.
21
22
* Keep your AKS cluster running the latest OS security updates and Kubernetes releases.
22
23
* Provide secure pod traffic and access to sensitive credentials.
23
24
24
-
This article introduces the core concepts that secure your applications in AKS:
25
-
26
-
-[Security concepts for applications and clusters in Azure Kubernetes Service (AKS)](#security-concepts-for-applications-and-clusters-in-azure-kubernetes-service-aks)
This article introduces the core concepts that secure your applications in AKS.
39
26
40
27
## Build Security
41
28
42
-
As the entry point for the Supply Chain, it is important to conduct static analysis of image builds before they are promoted down the pipeline. This includes vulnerability and compliance assessment. It is not about failing a build because it has a vulnerability, as that will break development. It is about looking at the "Vendor Status" to segment based on vulnerabilities that are actionable by the development teams. Also leverage "Grace Periods" to allow developers time to remediate identified issues.
29
+
As the entry point for the Supply Chain, it is important to conduct static analysis of image builds before they are promoted down the pipeline. This includes vulnerability and compliance assessment. It is not about failing a build because it has a vulnerability, as that will break development. It is about looking at the "Vendor Status" to segment based on vulnerabilities that are actionable by the development teams. Also leverage "Grace Periods" to allow developers time to remediate identified issues.
0 commit comments