@@ -65,7 +65,7 @@ evaluated on its merits.
65
65
- [ ] The [Role Based Access Control Good Practices](/docs/concepts/security/rbac-good-practices/)
66
66
are followed for guidance related to authentication and authorization.
67
67
-->
68
- ## 认证和鉴权 {#authentication-authorization}
68
+ ## 身份验证和鉴权 {#authentication-authorization}
69
69
70
70
- [ ] 在启动后 ` system:masters ` 组不用于用户或组件的身份验证。
71
71
- [ ] kube-controller-manager 运行时要启用 ` --use-service-account-credentials ` 参数。
@@ -89,7 +89,7 @@ an admin user.
89
89
<!--
90
90
## Network security
91
91
92
- - [ ] CNI plugins in- use supports network policies.
92
+ - [ ] CNI plugins in use support network policies.
93
93
- [ ] Ingress and egress network policies are applied to all workloads in the
94
94
cluster.
95
95
- [ ] Default network policies within each namespace, selecting all pods, denying
@@ -115,16 +115,15 @@ plugins provide the functionality to
115
115
restrict network resources that pods may communicate with. This is most commonly done
116
116
through [Network Policies](/docs/concepts/services-networking/network-policies/)
117
117
which provide a namespaced resource to define rules. Default network policies
118
- blocking everything egress and ingress, in each namespace, selecting all the
119
- pods, can be useful to adopt an allow list approach, ensuring that no workloads
120
- is missed.
118
+ that block all egress and ingress, in each namespace, selecting all pods, can be
119
+ useful to adopt an allow list approach to ensure that no workloads are missed.
121
120
-->
122
121
许多[ 容器网络接口(Container Network Interface,CNI)插件] ( /zh-cn/docs/concepts/extend-kubernetes/compute-storage-net/network-plugins/ ) 提供了限制
123
122
Pod 可能与之通信的网络资源的功能。
124
123
这种限制通常通过[ 网络策略] ( /zh-cn/docs/concepts/services-networking/network-policies/ ) 来完成,
125
124
网络策略提供了一种名字空间作用域的资源来定义规则。
126
125
在每个名字空间中,默认的网络策略会阻塞所有的出入站流量,并选择所有 Pod,
127
- 采用允许列表的方法很有用 ,可以确保不遗漏任何工作负载。
126
+ 这种采用允许列表的方法很有用 ,可以确保不遗漏任何工作负载。
128
127
129
128
<!--
130
129
Not all CNI plugins provide encryption in transit. If the chosen plugin lacks this
@@ -145,12 +144,12 @@ should be unique to etcd.
145
144
146
145
<!--
147
146
External Internet access to the Kubernetes API server should be restricted to
148
- not expose the API publicly. Be careful as many managed Kubernetes distribution
147
+ not expose the API publicly. Be careful, as many managed Kubernetes distributions
149
148
are publicly exposing the API server by default. You can then use a bastion host
150
149
to access the server.
151
150
152
151
The [kubelet](/docs/reference/command-line-tools-reference/kubelet/) API access
153
- should be restricted and not publicly exposed, the defaults authentication and
152
+ should be restricted and not exposed publicly , the default authentication and
154
153
authorization settings, when no configuration file specified with the `--config`
155
154
flag, are overly permissive.
156
155
-->
@@ -383,8 +382,8 @@ SELinux 仅在 Linux 节点上可用,
383
382
-->
384
383
## Pod 布局 {#pod-placement}
385
384
386
- - [ ] Pod 布局是根据应用程序的敏感级别来完成的 。
387
- - [ ] 敏感应用程序在节点上隔离运行或使用特定的沙箱运行时运行 。
385
+ - [ ] Pod 布局是根据应用的敏感级别来完成的 。
386
+ - [ ] 敏感应用在节点上隔离运行或使用特定的沙箱运行时运行 。
388
387
389
388
<!--
390
389
Pods that are on different tiers of sensitivity, for example, an application pod
@@ -395,8 +394,8 @@ pivot within the cluster. This separation should be enforced to prevent pods
395
394
accidentally being deployed onto the same node. This could be enforced with the
396
395
following features:
397
396
-->
398
- 处于不同敏感级别的 Pod,例如,应用程序 Pod 和 Kubernetes API 服务器,应该部署到不同的节点上 。
399
- 节点隔离的目的是防止应用程序容器的逃逸 ,进而直接访问敏感度更高的应用,
397
+ 处于不同敏感级别的 Pod,例如,应用程序 Pod 和 Kubernetes API 服务器应该被部署到不同的节点上 。
398
+ 节点隔离的目的是防止应用容器的逃逸 ,进而直接访问敏感度更高的应用,
400
399
甚至轻松地改变集群工作机制。
401
400
这种隔离应该被强制执行,以防止 Pod 集合被意外部署到同一节点上。
402
401
可以通过以下功能实现:
@@ -437,7 +436,7 @@ overhead.
437
436
: RuntimeClass 是一个用于选择容器运行时配置的特性,容器运行时配置用于运行 Pod 中的容器,
438
437
并以性能开销为代价提供或多或少的主机隔离能力。
439
438
440
- ## Secrets {#secrets}
439
+ ## Secret {#secrets}
441
440
442
441
<!--
443
442
- [ ] ConfigMaps are not used to hold confidential data.
@@ -591,20 +590,20 @@ Production.
591
590
- [ ] 保证准入链插件和 Webhook 的配置都是安全的。
592
591
593
592
<!--
594
- Admission controllers can help to improve the security of the cluster. However,
593
+ Admission controllers can help improve the security of the cluster. However,
595
594
they can present risks themselves as they extend the API server and
596
595
[should be properly secured](/blog/2022/01/19/secure-your-admission-controllers-and-webhooks/).
597
596
-->
598
597
准入控制器可以帮助提高集群的安全性。
599
598
然而,由于它们是对 API 服务器的扩展,其自身可能会带来风险,
600
- 所以它们[ 应该得到适当的保护] ( /blog/2022/01/19/secure-your-admission-controllers-and-webhooks/ ) 。
599
+ 所以它们[ 应该得到适当的保护] ( /zh-cn/ blog/2022/01/19/secure-your-admission-controllers-and-webhooks/ ) 。
601
600
602
601
<!--
603
602
The following lists present a number of admission controllers that could be
604
603
considered to enhance the security posture of your cluster and application. It
605
604
includes controllers that may be referenced in other parts of this document.
606
605
-->
607
- 下面列出了一些准入控制器,可以考虑用这些控制器来增强集群和应用程序的安全状况 。
606
+ 下面列出了一些准入控制器,可以考虑用这些控制器来增强集群和应用的安全状况 。
608
607
列表中包括了可能在本文档其他部分曾提及的控制器。
609
608
610
609
<!--
@@ -641,18 +640,18 @@ attribute') of `system:masters`.
641
640
642
641
<!--
643
642
[`LimitRanger`](/docs/reference/access-authn-authz/admission-controllers/#limitranger)
644
- : Enforce the LimitRange API constraints.
643
+ : Enforces the LimitRange API constraints.
645
644
-->
646
645
[ ` LimitRanger ` ] ( /zh-cn/docs/reference/access-authn-authz/admission-controllers/#limitranger )
647
646
: 强制执行 LimitRange API 约束。
648
647
649
648
<!--
650
649
[`MutatingAdmissionWebhook`](/docs/reference/access-authn-authz/admission-controllers/#mutatingadmissionwebhook)
651
650
: Allows the use of custom controllers through webhooks, these controllers may
652
- mutate requests that it reviews .
651
+ mutate requests that they review .
653
652
-->
654
653
[ ` MutatingAdmissionWebhook ` ] ( /zh-cn/docs/reference/access-authn-authz/admission-controllers/#mutatingadmissionwebhook )
655
- : 允许通过 Webhook 使用自定义控制器,这些控制器可能会变更它所审查的请求 。
654
+ : 允许通过 Webhook 使用自定义控制器,这些控制器可能会变更它们所审查的请求 。
656
655
657
656
<!--
658
657
[`PodSecurity`](/docs/reference/access-authn-authz/admission-controllers/#podsecurity)
@@ -678,8 +677,8 @@ not mutate requests that it reviews.
678
677
: 允许通过 Webhook 使用自定义控制器,这些控制器不变更它所审查的请求。
679
678
680
679
<!--
681
- The second group includes plugin that are not enabled by default but in general
682
- availability state and recommended to improve your security posture:
680
+ The second group includes plugins that are not enabled by default but are in general
681
+ availability state and are recommended to improve your security posture:
683
682
-->
684
683
第二组包括默认情况下没有启用、但处于正式发布状态的插件,建议启用这些插件以改善你的安全状况:
685
684
0 commit comments