You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/zh/blog/_posts/2022-01-19-Securing-Admission-Controllers.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@ It’s important to ensure that any security component in a cluster is well conf
98
98
<!--
99
99
### Secure cluster configuration for admission control
100
100
-->
101
-
### 准入控制的安全集群配置
101
+
### 为准入控制保护集群配置
102
102
103
103
<!--
104
104
In most cases, the admission controller webhook used by a cluster will be installed as a workload in the cluster. As a result, it’s important to ensure that Kubernetes' security features that could impact its operation are well configured.
@@ -110,29 +110,29 @@ In most cases, the admission controller webhook used by a cluster will be instal
110
110
* **Restrict [RBAC](/docs/reference/access-authn-authz/rbac/) rights**. Any user who has rights which would allow them to modify the configuration of the webhook objects or the workload that the admission controller uses could disrupt its operation. So it’s important to make sure that only cluster administrators have those rights.
* **Prevent privileged workloads**. One of the realities of container systems is that if a workload is given certain privileges, it will be possible to break out to the underlying cluster node and impact other containers on that node. Where admission controller services run in the cluster they’re protecting, it’s important to ensure that any requirement for privileged workloads is carefully reviewed and restricted as much as possible.
117
117
-->
118
118
***防止特权工作负载**。
119
119
容器系统的一个现实是,如果工作负载被赋予某些特权,
120
-
则有可能突破到底层集群节点并影响该节点上的其他容器。
120
+
则有可能逃逸到下层的集群节点并影响该节点上的其他容器。
121
121
如果准入控制器服务在它们所保护的集群上运行,
122
-
一定要确保对特权工作负载的任何要求都要经过仔细审查并尽可能地加以限制。
122
+
一定要确保对特权工作负载的所有请求都要经过仔细审查并尽可能地加以限制。
123
123
<!--
124
124
* **Strictly control external system access**. As a security service in a cluster admission controller systems will have access to sensitive information like credentials. To reduce the risk of this information being sent outside the cluster, [network policies](/docs/concepts/services-networking/network-policies/) should be used to restrict the admission controller services access to external networks.
* **Each cluster has a dedicated webhook**. Whilst it may be possible to have admission controller webhooks that serve multiple clusters, there is a risk when using that model that an attack on the webhook service would have a larger impact where it’s shared. Also where multiple clusters use an admission controller there will be increased complexity and access requirements, making it harder to secure.
133
133
-->
134
134
***每个集群都有一个专用的 webhook**。
135
-
虽然可能有服务于多个集群的准入控制器 webhook,
135
+
虽然可能让准入控制器 webhook 服务于多个集群的,
136
136
但在使用该模型时存在对 webhook 服务的攻击会对共享它的地方产生更大影响的风险。
137
137
此外,在多个集群使用准入控制器的情况下,复杂性和访问要求也会增加,从而更难保护其安全。
138
138
@@ -144,8 +144,8 @@ In most cases, the admission controller webhook used by a cluster will be instal
144
144
<!--
145
145
A key element of any admission controller used for Kubernetes security is the rulebase it uses. The rules need to be able to accurately meet their goals avoiding false positive and false negative results.
146
146
-->
147
-
任何用于 Kubernetes 安全的准入控制器的一个关键元素是它使用的规则库。
148
-
规则需要能够准确地满足其目标,避免误报和误报结果。
147
+
对于用于 Kubernetes 安全的所有准入控制器而言,一个关键元素是它使用的规则库。
148
+
规则需要能够准确地满足其目标,避免假阳性和假阴性结果。
149
149
150
150
<!--
151
151
* **Regularly test and review rules**. Admission controller rules need to be tested to ensure their accuracy. They also need to be regularly reviewed as the Kubernetes API will change with each new version, and rules need to be assessed with each Kubernetes release to understand any changes that may be required to keep them up to date.
0 commit comments