Skip to content

Commit b8ac776

Browse files
committed
Add info and link to good practices from caution
1 parent d8132bc commit b8ac776

File tree

1 file changed

+9
-8
lines changed
  • content/en/docs/concepts/configuration

1 file changed

+9
-8
lines changed

content/en/docs/concepts/configuration/secret.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -36,11 +36,12 @@ Additionally, anyone who is authorized to create a Pod in a namespace can use th
3636
In order to safely use Secrets, take at least the following steps:
3737

3838
1. [Enable Encryption at Rest](/docs/tasks/administer-cluster/encrypt-data/) for Secrets.
39-
1. [Enable or configure RBAC rules](/docs/reference/access-authn-authz/authorization/) that
40-
restrict reading and writing the Secret. Be aware that secrets can be obtained
41-
implicitly by anyone with the permission to create a Pod.
42-
1. Where appropriate, also use mechanisms such as RBAC to limit which principals are allowed
43-
to create new Secrets or replace existing ones.
39+
1. [Enable or configure RBAC rules](/docs/reference/access-authn-authz/authorization/) with least-privilege access to Secrets.
40+
1. Restrict Secret access to specific containers.
41+
1. [Consider using external Secret store providers](https://secrets-store-csi-driver.sigs.k8s.io/concepts.html#provider-for-the-secrets-store-csi-driver).
42+
43+
For more guidelines to manage and improve the security of your Secrets, refer to
44+
[Good practices for Kubernetes Secrets](/docs/concepts/security/secrets-good-practices).
4445

4546
{{< /caution >}}
4647

@@ -174,7 +175,7 @@ systems on your behalf.
174175

175176
Secret volume sources are validated to ensure that the specified object
176177
reference actually points to an object of type Secret. Therefore, a Secret
177-
needs to be created before any Pods that depend on it.
178+
needs to be created before any Pods that depend on it.
178179

179180
If the Secret cannot be fetched (perhaps because it does not exist, or
180181
due to a temporary lack of connection to the API server) the kubelet
@@ -324,7 +325,7 @@ secret volume mount have permission `0400`.
324325
{{< note >}}
325326
If you're defining a Pod or a Pod template using JSON, beware that the JSON
326327
specification doesn't support octal notation. You can use the decimal value
327-
for the `defaultMode` (for example, 0400 in octal is 256 in decimal) instead.
328+
for the `defaultMode` (for example, 0400 in octal is 256 in decimal) instead.
328329
If you're writing YAML, you can write the `defaultMode` in octal.
329330
{{< /note >}}
330331

@@ -931,7 +932,7 @@ data:
931932
After creating the Secret, wait for Kubernetes to populate the `token` key in the `data` field.
932933

933934
See the [ServiceAccount](/docs/tasks/configure-pod-container/configure-service-account/)
934-
documentation for more information on how service accounts work.
935+
documentation for more information on how service accounts work.
935936
You can also check the `automountServiceAccountToken` field and the
936937
`serviceAccountName` field of the
937938
[`Pod`](/docs/reference/generated/kubernetes-api/{{< param "version" >}}/#pod-v1-core)

0 commit comments

Comments
 (0)