Skip to content

Commit e81b810

Browse files
authored
Merge pull request #114508 from seanmck/conceptual-updates
Updating security concepts article to include recent feature additions
2 parents a42f5b3 + c9f29e5 commit e81b810

File tree

1 file changed

+11
-2
lines changed

1 file changed

+11
-2
lines changed

articles/aks/concepts-security.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concepts - Security in Azure Kubernetes Services (AKS)
33
description: Learn about security in Azure Kubernetes Service (AKS), including master and node communication, network policies, and Kubernetes secrets.
44
services: container-service
55
ms.topic: conceptual
6-
ms.date: 03/01/2019
6+
ms.date: 05/08/2020
77

88
---
99

@@ -23,7 +23,9 @@ This article introduces the core concepts that secure your applications in AKS:
2323

2424
In AKS, the Kubernetes master components are part of the managed service provided by Microsoft. Each AKS cluster has its own single-tenanted, dedicated Kubernetes master to provide the API Server, Scheduler, etc. This master is managed and maintained by Microsoft.
2525

26-
By default, the Kubernetes API server uses a public IP address and a fully qualified domain name (FQDN). You can control access to the API server using Kubernetes role-based access controls and Azure Active Directory. For more information, see [Azure AD integration with AKS][aks-aad].
26+
By default, the Kubernetes API server uses a public IP address and a fully qualified domain name (FQDN). You can limit access to the API server endpoint using [authorized IP ranges][authorized-ip-ranges]. You can also create a fully [private cluster][private-clusters] to limit API server access to your virtual network.
27+
28+
You can control access to the API server using Kubernetes role-based access controls and Azure Active Directory. For more information, see [Azure AD integration with AKS][aks-aad].
2729

2830
## Node security
2931

@@ -62,6 +64,10 @@ For connectivity and security with on-premises networks, you can deploy your AKS
6264

6365
To filter the flow of traffic in virtual networks, Azure uses network security group rules. These rules define the source and destination IP ranges, ports, and protocols that are allowed or denied access to resources. Default rules are created to allow TLS traffic to the Kubernetes API server. As you create services with load balancers, port mappings, or ingress routes, AKS automatically modifies the network security group for traffic to flow appropriately.
6466

67+
### Kubernetes network policy
68+
69+
To limit network traffic between pods in your cluster, AKS offers support for [Kubernetes network policies][network-policy]. With network policies, you can choose to allow or deny specific network paths within the cluster based on namespaces and label selectors.
70+
6571
## Kubernetes Secrets
6672

6773
A Kubernetes *Secret* is used to inject sensitive data into pods, such as access credentials or keys. You first create a Secret using the Kubernetes API. When you define your pod or deployment, a specific Secret can be requested. Secrets are only provided to nodes that have a scheduled pod that requires it, and the Secret is stored in *tmpfs*, not written to disk. When the last pod on a node that requires a Secret is deleted, the Secret is deleted from the node's tmpfs. Secrets are stored within a given namespace and can only be accessed by pods within the same namespace.
@@ -100,3 +106,6 @@ For additional information on core Kubernetes and AKS concepts, see the followin
100106
[operator-best-practices-cluster-security]: operator-best-practices-cluster-security.md
101107
[developer-best-practices-pod-security]:developer-best-practices-pod-security.md
102108
[nodepool-upgrade]: use-multiple-node-pools.md#upgrade-a-node-pool
109+
[authorized-ip-ranges]: api-server-authorized-ip-ranges.md
110+
[private-clusters]: private-clusters.md
111+
[network-policy]: use-network-policies.md

0 commit comments

Comments
 (0)