Skip to content

Commit e2adbc9

Browse files
committed
Incorporated feedback and added TOC entry
1 parent 2f85b1e commit e2adbc9

File tree

3 files changed

+8
-6
lines changed

3 files changed

+8
-6
lines changed

articles/aks/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -343,6 +343,8 @@
343343
href: ../defender-for-cloud/defender-for-containers-enable.md?tabs=aks-deploy-portal%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-aks?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
344344
- name: Image security
345345
items:
346+
- name: Validate signed images with Image Integrity
347+
href: image-integrity.md
346348
- name: Remove vulnerable images with ImageCleaner
347349
href: image-cleaner.md
348350
- name: Scan images in your CI/CD Workflow

articles/aks/image-integrity.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ author: schaffererin
55
ms.author: schaffererin
66
ms.service: azure-kubernetes-service
77
ms.topic: article
8-
ms.date: 09/19/2023
8+
ms.date: 09/20/2023
99
---
1010

1111
# Use Image Integrity to validate signed images before deploying them to your Azure Kubernetes Service (AKS) clusters (Preview)
1212

13-
Azure Kubernetes Service (AKS) and its underlying container model provide increased scalability and manageability for cloud native applications. With AKS, you can launch flexible software applications according to the runtime needs of your system. However, this flexible can introduce new challenges.
13+
Azure Kubernetes Service (AKS) and its underlying container model provide increased scalability and manageability for cloud native applications. With AKS, you can launch flexible software applications according to the runtime needs of your system. However, this flexibility can introduce new challenges.
1414

15-
In these application environments, using signed container images helps verify that your deployments are built from a trusted entity and that images haven't been tampered with since their creation. Image Integrity is a service that allows you to add deploy-time policy enforcements to your AKS clusters to check whether the images are signed.
15+
In these application environments, using signed container images helps verify that your deployments are built from a trusted entity and that images haven't been tampered with since their creation. Image Integrity is a service that allows you to add an AKS built-in policy to verify and enforce that only signed images are deployed to your AKS clusters.
1616

1717
> [!NOTE]
1818
> Image Integrity is a feature based on [Ratify][ratify]. On an AKS cluster, the feature name and property name is `ImageIntegrity`, while the relevant Image Integrity pods' names contain `Ratify`.
@@ -25,7 +25,7 @@ In these application environments, using signed container images helps verify th
2525
* [Azure CLI][azure-cli-install] or [Azure PowerShell][azure-powershell-install].
2626
* `aks-preview` CLI extension version 0.5.96 or later.
2727
* The Azure Policy add-on for AKS. If you don't have this add-on installed, see [Install Azure Policy add-on for AKS](../governance/policy/concepts/policy-for-kubernetes.md#install-azure-policy-add-on-for-aks).
28-
* An AKS cluster enabled with OIDC Issuer. To create a new cluster or update an existing cluster, see [Configure an AKS cluster with OIDC Issuer](/cluster-configuration.md#oidc-issuer).
28+
* An AKS cluster enabled with OIDC Issuer. To create a new cluster or update an existing cluster, see [Configure an AKS cluster with OIDC Issuer](./use-oidc-issuer.md).
2929
* The `EnableImageIntegrityPreview` and `AKS-AzurePolicyExternalData` feature flags registered on your Azure subscription. Register the feature flags using the following commands:
3030

3131
1. Register the `EnableImageIntegrityPreview` and `AKS-AzurePolicyExternalData` feature flags using the [`az feature register`][az-feature-register] command.
@@ -68,7 +68,7 @@ In these application environments, using signed container images helps verify th
6868
6969
:::image type="content" source="./media/image-integrity/aks-image-integrity-architecture.png" alt-text="Screenshot showing the basic architecture for Image Integrity" lightbox="./media/image-integrity/aks-image-integrity-architecture.png":::
7070
71-
Enabling Image Integrity on your cluster also deploys a `Ratify` pod. This `Ratify` pod performs the following tasks:
71+
Image Integrity uses Ratify, Azure Policy, and Gatekeeper to validate signed images before deploying them to your AKS clusters. Enabling Image Integrity on your cluster deploys a `Ratify` pod. This `Ratify` pod performs the following tasks:
7272
7373
1. Reconciles certificates from Azure Key Vault per the configuration you set up through `Ratify` CRDs.
7474
2. Accesses images stored in ACR when validation requests come from [Azure Policy](../governance/policy/concepts/policy-for-kubernetes.md), an admission controller webhook that extends [Gatekeeper](https://open-policy-agent.github.io/gatekeeper).
@@ -116,7 +116,7 @@ Enabling Image Integrity on your cluster also deploys a `Ratify` pod. This `Rati
116116
117117
For Image Integrity to properly verify the target signed image, you need to set up `Ratify` configurations through K8s [CRDs](https://kubernetes.io/docs/concepts/extend-kubernetes/api-extension/custom-resources/#customresourcedefinitions) using `kubectl`.
118118
119-
In this article, we use an example CRD to set up verification configurations For more examples, see [Ratify CRDs](https://github.com/deislabs/ratify/blob/main/docs/reference/ratify-configuration.md).
119+
In this article, we use a self-signed CA cert from the official Ratify documentation to set up verification configurations. For more examples, see [Ratify CRDs](https://github.com/deislabs/ratify/blob/main/docs/reference/ratify-configuration.md).
120120
121121
1. Create a `VerifyConfig` file named `verify-config.yaml` and copy in the following YAML:
122122
-30.4 KB
Loading

0 commit comments

Comments
 (0)