Skip to content

Commit ca51de6

Browse files
Merge pull request #223951 from schaffererin/concepts-security-edit
Removed ToC from inside the doc since there's already a ToC embedded at the top
2 parents cccc0e5 + aa5e98a commit ca51de6

File tree

1 file changed

+3
-16
lines changed

1 file changed

+3
-16
lines changed

articles/aks/concepts-security.md

Lines changed: 3 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,31 +15,18 @@ Container security protects the entire end-to-end pipeline from build to the app
1515
The Secure Supply Chain includes the build environment and registry.
1616

1717
Kubernetes includes security components, such as *pod security standards* and *Secrets*. Meanwhile, Azure includes components like Active Directory, Microsoft Defender for Containers, Azure Policy, Azure Key Vault, network security groups and orchestrated cluster upgrades. AKS combines these security components to:
18+
1819
* Provide a complete Authentication and Authorization story.
1920
* Leverage AKS Built-in Azure Policy to secure your applications.
2021
* End-to-End insight from build through your application with Microsoft Defender for Containers.
2122
* Keep your AKS cluster running the latest OS security updates and Kubernetes releases.
2223
* Provide secure pod traffic and access to sensitive credentials.
2324

24-
This article introduces the core concepts that secure your applications in AKS:
25-
26-
- [Security concepts for applications and clusters in Azure Kubernetes Service (AKS)](#security-concepts-for-applications-and-clusters-in-azure-kubernetes-service-aks)
27-
- [Build security](#build-security)
28-
- [Registry security](#registry-security)
29-
- [Cluster security](#cluster-security)
30-
- [Node security](#node-security)
31-
- [Compute isolation](#compute-isolation)
32-
- [Cluster upgrades](#cluster-upgrades)
33-
- [Cordon and drain](#cordon-and-drain)
34-
- [Network security](#network-security)
35-
- [Azure network security groups](#azure-network-security-groups)
36-
- [Application Security](#application-security)
37-
- [Kubernetes Secrets](#kubernetes-secrets)
38-
- [Next steps](#next-steps)
25+
This article introduces the core concepts that secure your applications in AKS.
3926

4027
## Build Security
4128

42-
As the entry point for the Supply Chain, it is important to conduct static analysis of image builds before they are promoted down the pipeline. This includes vulnerability and compliance assessment. It is not about failing a build because it has a vulnerability, as that will break development. It is about looking at the "Vendor Status" to segment based on vulnerabilities that are actionable by the development teams. Also leverage "Grace Periods" to allow developers time to remediate identified issues.
29+
As the entry point for the Supply Chain, it is important to conduct static analysis of image builds before they are promoted down the pipeline. This includes vulnerability and compliance assessment. It is not about failing a build because it has a vulnerability, as that will break development. It is about looking at the "Vendor Status" to segment based on vulnerabilities that are actionable by the development teams. Also leverage "Grace Periods" to allow developers time to remediate identified issues.
4330

4431
## Registry Security
4532

0 commit comments

Comments
 (0)