Skip to content

Commit c436f71

Browse files
authored
docs: start the localization
1 parent 9e1a118 commit c436f71

File tree

1 file changed

+133
-0
lines changed
  • content/pt-br/docs/concepts/security

1 file changed

+133
-0
lines changed
Lines changed: 133 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,138 @@
11
---
22
title: "Segurança"
33
weight: 81
4+
description: >
5+
Conceitos para manutenção das suas cargas de trabalho cloud native seguras.
6+
simple_list: true
47
---
58

9+
Essa seção da documentação do Kubernetes busca ensinar a executar cargas de trabalho
10+
mais seguras e aspectos essenciais para a manutenção de um cluster Kubernetes seguro.
11+
12+
13+
Kubernetes is based on a cloud-native architecture, and draws on advice from the
14+
{{< glossary_tooltip text="CNCF" term_id="cncf" >}} about good practice for
15+
cloud native information security.
16+
17+
Read [Cloud Native Security and Kubernetes](/docs/concepts/security/cloud-native-security/)
18+
for the broader context about how to secure your cluster and the applications that
19+
you're running on it.
20+
21+
## Kubernetes security mechanisms {#security-mechanisms}
22+
23+
Kubernetes includes several APIs and security controls, as well as ways to
24+
define [policies](#policies) that can form part of how you manage information security.
25+
26+
### Control plane protection
27+
28+
A key security mechanism for any Kubernetes cluster is to
29+
[control access to the Kubernetes API](/docs/concepts/security/controlling-access).
30+
31+
Kubernetes expects you to configure and use TLS to provide
32+
[data encryption in transit](/docs/tasks/tls/managing-tls-in-a-cluster/)
33+
within the control plane, and between the control plane and its clients.
34+
You can also enable [encryption at rest](/docs/tasks/administer-cluster/encrypt-data/)
35+
for the data stored within Kubernetes control plane; this is separate from using
36+
encryption at rest for your own workloads' data, which might also be a good idea.
37+
38+
### Secrets
39+
40+
The [Secret](/docs/concepts/configuration/secret/) API provides basic protection for
41+
configuration values that require confidentiality.
42+
43+
### Workload protection
44+
45+
Enforce [Pod security standards](/docs/concepts/security/pod-security-standards/) to
46+
ensure that Pods and their containers are isolated appropriately. You can also use
47+
[RuntimeClasses](/docs/concepts/containers/runtime-class) to define custom isolation
48+
if you need it.
49+
50+
[Network policies](/docs/concepts/services-networking/network-policies/) let you control
51+
network traffic between Pods, or between Pods and the network outside your cluster.
52+
53+
You can deploy security controls from the wider ecosystem to implement preventative
54+
or detective controls around Pods, their containers, and the images that run in them.
55+
56+
### Admission control {#admission-control}
57+
58+
[Admission controllers](/docs/reference/access-authn-authz/admission-controllers/)
59+
are plugins that intercept Kubernetes API requests and can validate or mutate
60+
the requests based on specific fields in the request. Thoughtfully designing
61+
these controllers helps to avoid unintended disruptions as Kubernetes APIs
62+
change across version updates. For design considerations, see
63+
[Admission Webhook Good Practices](/docs/concepts/cluster-administration/admission-webhooks-good-practices/).
64+
65+
### Auditing
66+
67+
Kubernetes [audit logging](/docs/tasks/debug/debug-cluster/audit/) provides a
68+
security-relevant, chronological set of records documenting the sequence of actions
69+
in a cluster. The cluster audits the activities generated by users, by applications
70+
that use the Kubernetes API, and by the control plane itself.
71+
72+
## Cloud provider security
73+
74+
{{% thirdparty-content vendor="true" %}}
75+
76+
If you are running a Kubernetes cluster on your own hardware or a different cloud provider,
77+
consult your documentation for security best practices.
78+
Here are links to some of the popular cloud providers' security documentation:
79+
80+
{{< table caption="Cloud provider security" >}}
81+
82+
IaaS Provider | Link |
83+
-------------------- | ------------ |
84+
Alibaba Cloud | https://www.alibabacloud.com/trust-center |
85+
Amazon Web Services | https://aws.amazon.com/security |
86+
Google Cloud Platform | https://cloud.google.com/security |
87+
Huawei Cloud | https://www.huaweicloud.com/intl/en-us/securecenter/overallsafety |
88+
IBM Cloud | https://www.ibm.com/cloud/security |
89+
Microsoft Azure | https://docs.microsoft.com/en-us/azure/security/azure-security |
90+
Oracle Cloud Infrastructure | https://www.oracle.com/security |
91+
Tencent Cloud | https://www.tencentcloud.com/solutions/data-security-and-information-protection |
92+
VMware vSphere | https://www.vmware.com/solutions/security/hardening-guides |
93+
94+
{{< /table >}}
95+
96+
## Policies
97+
98+
You can define security policies using Kubernetes-native mechanisms,
99+
such as [NetworkPolicy](/docs/concepts/services-networking/network-policies/)
100+
(declarative control over network packet filtering) or
101+
[ValidatingAdmissionPolicy](/docs/reference/access-authn-authz/validating-admission-policy/) (declarative restrictions on what changes
102+
someone can make using the Kubernetes API).
103+
104+
However, you can also rely on policy implementations from the wider
105+
ecosystem around Kubernetes. Kubernetes provides extension mechanisms
106+
to let those ecosystem projects implement their own policy controls
107+
on source code review, container image approval, API access controls,
108+
networking, and more.
109+
110+
For more information about policy mechanisms and Kubernetes,
111+
read [Policies](/docs/concepts/policy/).
112+
113+
## {{% heading "whatsnext" %}}
114+
115+
Learn about related Kubernetes security topics:
116+
117+
* [Securing your cluster](/docs/tasks/administer-cluster/securing-a-cluster/)
118+
* [Known vulnerabilities](/docs/reference/issues-security/official-cve-feed/)
119+
in Kubernetes (and links to further information)
120+
* [Data encryption in transit](/docs/tasks/tls/managing-tls-in-a-cluster/) for the control plane
121+
* [Data encryption at rest](/docs/tasks/administer-cluster/encrypt-data/)
122+
* [Controlling Access to the Kubernetes API](/docs/concepts/security/controlling-access)
123+
* [Network policies](/docs/concepts/services-networking/network-policies/) for Pods
124+
* [Secrets in Kubernetes](/docs/concepts/configuration/secret/)
125+
* [Pod security standards](/docs/concepts/security/pod-security-standards/)
126+
* [RuntimeClasses](/docs/concepts/containers/runtime-class)
127+
128+
Learn the context:
129+
130+
<!-- if changing this, also edit the front matter of content/en/docs/concepts/security/cloud-native-security.md to match; check the no_list setting -->
131+
* [Cloud Native Security and Kubernetes](/docs/concepts/security/cloud-native-security/)
132+
133+
Get certified:
134+
135+
* [Certified Kubernetes Security Specialist](https://training.linuxfoundation.org/certification/certified-kubernetes-security-specialist/)
136+
certification and official training course.
137+
138+
Read more in this section:

0 commit comments

Comments
 (0)