Skip to content

Commit 36349db

Browse files
committed
[zh] Sync security-checklist.md
1 parent aaa7e09 commit 36349db

File tree

1 file changed

+20
-21
lines changed

1 file changed

+20
-21
lines changed

content/zh-cn/docs/concepts/security/security-checklist.md

Lines changed: 20 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ evaluated on its merits.
6565
- [ ] The [Role Based Access Control Good Practices](/docs/concepts/security/rbac-good-practices/)
6666
are followed for guidance related to authentication and authorization.
6767
-->
68-
## 认证和鉴权 {#authentication-authorization}
68+
## 身份验证和鉴权 {#authentication-authorization}
6969

7070
- [ ] 在启动后 `system:masters` 组不用于用户或组件的身份验证。
7171
- [ ] kube-controller-manager 运行时要启用 `--use-service-account-credentials` 参数。
@@ -89,7 +89,7 @@ an admin user.
8989
<!--
9090
## Network security
9191
92-
- [ ] CNI plugins in-use supports network policies.
92+
- [ ] CNI plugins in use support network policies.
9393
- [ ] Ingress and egress network policies are applied to all workloads in the
9494
cluster.
9595
- [ ] Default network policies within each namespace, selecting all pods, denying
@@ -115,16 +115,15 @@ plugins provide the functionality to
115115
restrict network resources that pods may communicate with. This is most commonly done
116116
through [Network Policies](/docs/concepts/services-networking/network-policies/)
117117
which provide a namespaced resource to define rules. Default network policies
118-
blocking everything egress and ingress, in each namespace, selecting all the
119-
pods, can be useful to adopt an allow list approach, ensuring that no workloads
120-
is missed.
118+
that block all egress and ingress, in each namespace, selecting all pods, can be
119+
useful to adopt an allow list approach to ensure that no workloads are missed.
121120
-->
122121
许多[容器网络接口(Container Network Interface,CNI)插件](/zh-cn/docs/concepts/extend-kubernetes/compute-storage-net/network-plugins/)提供了限制
123122
Pod 可能与之通信的网络资源的功能。
124123
这种限制通常通过[网络策略](/zh-cn/docs/concepts/services-networking/network-policies/)来完成,
125124
网络策略提供了一种名字空间作用域的资源来定义规则。
126125
在每个名字空间中,默认的网络策略会阻塞所有的出入站流量,并选择所有 Pod,
127-
采用允许列表的方法很有用,可以确保不遗漏任何工作负载。
126+
这种采用允许列表的方法很有用,可以确保不遗漏任何工作负载。
128127

129128
<!--
130129
Not all CNI plugins provide encryption in transit. If the chosen plugin lacks this
@@ -145,12 +144,12 @@ should be unique to etcd.
145144

146145
<!--
147146
External Internet access to the Kubernetes API server should be restricted to
148-
not expose the API publicly. Be careful as many managed Kubernetes distribution
147+
not expose the API publicly. Be careful, as many managed Kubernetes distributions
149148
are publicly exposing the API server by default. You can then use a bastion host
150149
to access the server.
151150
152151
The [kubelet](/docs/reference/command-line-tools-reference/kubelet/) API access
153-
should be restricted and not publicly exposed, the defaults authentication and
152+
should be restricted and not exposed publicly, the default authentication and
154153
authorization settings, when no configuration file specified with the `--config`
155154
flag, are overly permissive.
156155
-->
@@ -383,8 +382,8 @@ SELinux 仅在 Linux 节点上可用,
383382
-->
384383
## Pod 布局 {#pod-placement}
385384

386-
- [ ] Pod 布局是根据应用程序的敏感级别来完成的
387-
- [ ] 敏感应用程序在节点上隔离运行或使用特定的沙箱运行时运行
385+
- [ ] Pod 布局是根据应用的敏感级别来完成的
386+
- [ ] 敏感应用在节点上隔离运行或使用特定的沙箱运行时运行
388387

389388
<!--
390389
Pods that are on different tiers of sensitivity, for example, an application pod
@@ -395,8 +394,8 @@ pivot within the cluster. This separation should be enforced to prevent pods
395394
accidentally being deployed onto the same node. This could be enforced with the
396395
following features:
397396
-->
398-
处于不同敏感级别的 Pod,例如,应用程序 Pod 和 Kubernetes API 服务器,应该部署到不同的节点上
399-
节点隔离的目的是防止应用程序容器的逃逸,进而直接访问敏感度更高的应用,
397+
处于不同敏感级别的 Pod,例如,应用程序 Pod 和 Kubernetes API 服务器应该被部署到不同的节点上
398+
节点隔离的目的是防止应用容器的逃逸,进而直接访问敏感度更高的应用,
400399
甚至轻松地改变集群工作机制。
401400
这种隔离应该被强制执行,以防止 Pod 集合被意外部署到同一节点上。
402401
可以通过以下功能实现:
@@ -437,7 +436,7 @@ overhead.
437436
: RuntimeClass 是一个用于选择容器运行时配置的特性,容器运行时配置用于运行 Pod 中的容器,
438437
并以性能开销为代价提供或多或少的主机隔离能力。
439438

440-
## Secrets {#secrets}
439+
## Secret {#secrets}
441440

442441
<!--
443442
- [ ] ConfigMaps are not used to hold confidential data.
@@ -591,20 +590,20 @@ Production.
591590
- [ ] 保证准入链插件和 Webhook 的配置都是安全的。
592591

593592
<!--
594-
Admission controllers can help to improve the security of the cluster. However,
593+
Admission controllers can help improve the security of the cluster. However,
595594
they can present risks themselves as they extend the API server and
596595
[should be properly secured](/blog/2022/01/19/secure-your-admission-controllers-and-webhooks/).
597596
-->
598597
准入控制器可以帮助提高集群的安全性。
599598
然而,由于它们是对 API 服务器的扩展,其自身可能会带来风险,
600-
所以它们[应该得到适当的保护](/blog/2022/01/19/secure-your-admission-controllers-and-webhooks/)
599+
所以它们[应该得到适当的保护](/zh-cn/blog/2022/01/19/secure-your-admission-controllers-and-webhooks/)
601600

602601
<!--
603602
The following lists present a number of admission controllers that could be
604603
considered to enhance the security posture of your cluster and application. It
605604
includes controllers that may be referenced in other parts of this document.
606605
-->
607-
下面列出了一些准入控制器,可以考虑用这些控制器来增强集群和应用程序的安全状况
606+
下面列出了一些准入控制器,可以考虑用这些控制器来增强集群和应用的安全状况
608607
列表中包括了可能在本文档其他部分曾提及的控制器。
609608

610609
<!--
@@ -641,18 +640,18 @@ attribute') of `system:masters`.
641640

642641
<!--
643642
[`LimitRanger`](/docs/reference/access-authn-authz/admission-controllers/#limitranger)
644-
: Enforce the LimitRange API constraints.
643+
: Enforces the LimitRange API constraints.
645644
-->
646645
[`LimitRanger`](/zh-cn/docs/reference/access-authn-authz/admission-controllers/#limitranger)
647646
: 强制执行 LimitRange API 约束。
648647

649648
<!--
650649
[`MutatingAdmissionWebhook`](/docs/reference/access-authn-authz/admission-controllers/#mutatingadmissionwebhook)
651650
: Allows the use of custom controllers through webhooks, these controllers may
652-
mutate requests that it reviews.
651+
mutate requests that they review.
653652
-->
654653
[`MutatingAdmissionWebhook`](/zh-cn/docs/reference/access-authn-authz/admission-controllers/#mutatingadmissionwebhook)
655-
: 允许通过 Webhook 使用自定义控制器,这些控制器可能会变更它所审查的请求
654+
: 允许通过 Webhook 使用自定义控制器,这些控制器可能会变更它们所审查的请求
656655

657656
<!--
658657
[`PodSecurity`](/docs/reference/access-authn-authz/admission-controllers/#podsecurity)
@@ -678,8 +677,8 @@ not mutate requests that it reviews.
678677
: 允许通过 Webhook 使用自定义控制器,这些控制器不变更它所审查的请求。
679678

680679
<!--
681-
The second group includes plugin that are not enabled by default but in general
682-
availability state and recommended to improve your security posture:
680+
The second group includes plugins that are not enabled by default but are in general
681+
availability state and are recommended to improve your security posture:
683682
-->
684683
第二组包括默认情况下没有启用、但处于正式发布状态的插件,建议启用这些插件以改善你的安全状况:
685684

0 commit comments

Comments
 (0)