File tree Expand file tree Collapse file tree 2 files changed +4
-1
lines changed
content/en/docs/concepts/security Expand file tree Collapse file tree 2 files changed +4
-1
lines changed Original file line number Diff line number Diff line change @@ -3,6 +3,7 @@ title: Kubernetes API Server Bypass Risks
3
3
description : >
4
4
Security architecture information relating to the API server and other components
5
5
content_type : concept
6
+ weight : 90
6
7
---
7
8
8
9
<!-- overview -->
@@ -143,4 +144,4 @@ control plane components.
143
144
that include the container runtime socket, either directly or by mounting a parent
144
145
directory. Also ` hostPath ` mounts must be set as read-only to mitigate risks
145
146
of attackers bypassing directory restrictions.
146
- - Restrict user access to nodes, and especially restrict superuser access to nodes.
147
+ - Restrict user access to nodes, and especially restrict superuser access to nodes.
Original file line number Diff line number Diff line change @@ -3,6 +3,7 @@ title: Security Checklist
3
3
description : >
4
4
Baseline checklist for ensuring security in Kubernetes clusters.
5
5
content_type : concept
6
+ weight : 100
6
7
---
7
8
8
9
<!-- overview -->
@@ -12,6 +13,7 @@ comprehensive documentation on each topic. It does not claim to be exhaustive
12
13
and is meant to evolve.
13
14
14
15
On how to read and use this document:
16
+
15
17
- The order of topics does not reflect an order of priority.
16
18
- Some checklist items are detailed in the paragraph below the list of each section.
17
19
You can’t perform that action at this time.
0 commit comments