Skip to content

Commit db31d7c

Browse files
authored
Merge pull request #45186 from my-git9/security-index1
[zh-cn]sync security/_index.md
2 parents 11fc2c8 + 4e209de commit db31d7c

File tree

1 file changed

+249
-0
lines changed
  • content/zh-cn/docs/concepts/security

1 file changed

+249
-0
lines changed

content/zh-cn/docs/concepts/security/_index.md

Lines changed: 249 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,253 @@
22
title: "安全"
33
weight: 85
44
description: 确保云原生工作负载安全的一组概念。
5+
simple_list: true
56
---
7+
8+
<!--
9+
title: "Security"
10+
weight: 85
11+
description: >
12+
Concepts for keeping your cloud-native workload secure.
13+
simple_list: true
14+
-->
15+
16+
<!--
17+
This section of the Kubernetes documentation aims to help you learn to run
18+
workloads more securely, and about the essential aspects of keeping a
19+
Kubernetes cluster secure.
20+
21+
Kubernetes is based on a cloud-native architecture, and draws on advice from the
22+
{{< glossary_tooltip text="CNCF" term_id="cncf" >}} about good practice for
23+
cloud native information security.
24+
-->
25+
Kubernetes 文档的这一部分内容的旨在引导你学习如何更安全地运行工作负载,
26+
以及维护 Kubernetes 集群的基本安全性。
27+
28+
Kubernetes 基于云原生架构,并借鉴了
29+
{{< glossary_tooltip text="CNCF" term_id="cncf" >}} 有关云原生信息安全良好实践的建议。
30+
31+
<!--
32+
Read [Cloud Native Security and Kubernetes](/docs/concepts/security/cloud-native-security/)
33+
for the broader context about how to secure your cluster and the applications that
34+
you're running on it.
35+
-->
36+
请阅读[云原生安全和 Kubernetes](/zh-cn/docs/concepts/security/cloud-native-security/)
37+
了解有关如何保护集群及其上运行的应用程序的更广泛背景信息。
38+
39+
<!--
40+
## Kubernetes security mechanisms {#security-mechanisms}
41+
42+
Kubernetes includes several APIs and security controls, as well as ways to
43+
define [policies](#policies) that can form part of how you manage information security.
44+
-->
45+
## Kubernetes 安全机制 {#security-mechanisms}
46+
47+
Kubernetes 包含多个 API 和安全组件,
48+
以及定义[策略](#policies)的方法,这些策略可以作为你的信息安全管理的一部分。
49+
50+
<!--
51+
### Control plane protection
52+
53+
A key security mechanism for any Kubernetes cluster is to
54+
[control access to the Kubernetes API](/docs/concepts/security/controlling-access).
55+
-->
56+
### 控制平面保护
57+
58+
任何 Kubernetes 集群的一个关键安全机制是[控制对 Kubernetes API 的访问](/zh-cn/docs/concepts/security/controlling-access)
59+
60+
<!--
61+
Kubernetes expects you to configure and use TLS to provide
62+
[data encryption in transit](/docs/tasks/tls/managing-tls-in-a-cluster/)
63+
within the control plane, and between the control plane and its clients.
64+
You can also enable [encryption at rest](/docs/tasks/administer-cluster/encrypt-data/)
65+
for the data stored within Kubernetes control plane; this is separate from using
66+
encryption at rest for your own workloads' data, which might also be a good idea.
67+
-->
68+
Kubernetes 希望你配置并使用 TLS,
69+
以便在控制平面内以及控制平面与其客户端之间提供[传输中的数据加密](/zh-cn/docs/tasks/tls/managing-tls-in-a-cluster/)
70+
你还可以为 Kubernetes 控制平面中存储的数据启用静态加密;
71+
这与对你自己的工作负载数据使用静态加密不同,后者可能也是一个好主意。
72+
73+
<!--
74+
### Secrets
75+
76+
The [Secret](/docs/concepts/configuration/secret/) API provides basic protection for
77+
configuration values that require confidentiality.
78+
-->
79+
### Secret
80+
81+
[Secret](/zh-cn/docs/concepts/configuration/secret/) API
82+
为需要保密的配置值提供基本保护。
83+
84+
<!--
85+
### Workload protection
86+
87+
Enforce [Pod security standards](/docs/concepts/security/pod-security-standards/) to
88+
ensure that Pods and their containers are isolated appropriately. You can also use
89+
[RuntimeClasses](/docs/concepts/containers/runtime-class) to define custom isolation
90+
if you need it.
91+
-->
92+
### 工具负载保护
93+
94+
实施 [Pod 安全标准](/zh-cn/docs/concepts/security/pod-security-standards/)以确保
95+
Pod 及其容器得到适当隔离。如果需要,你还可以使用
96+
[RuntimeClass](/zh-cn/docs/concepts/containers/runtime-class) 来配置自定义隔离。
97+
98+
<!--
99+
[Network policies](/docs/concepts/services-networking/network-policies/) let you control
100+
network traffic between Pods, or between Pods and the network outside your cluster.
101+
102+
You can deploy security controls from the wider ecosystem to implement preventative
103+
or detective controls around Pods, their containers, and the images that run in them.
104+
-->
105+
[网络策略(NetworkPolicy)](/zh-cn/docs/concepts/services-networking/network-policies/)
106+
可让控制 Pod 之间或 Pod 与集群外部网络之间的网络流量。
107+
108+
<!--
109+
### Auditing
110+
111+
Kubernetes [audit logging](/docs/tasks/debug/debug-cluster/audit/) provides a
112+
security-relevant, chronological set of records documenting the sequence of actions
113+
in a cluster. The cluster audits the activities generated by users, by applications
114+
that use the Kubernetes API, and by the control plane itself.
115+
-->
116+
### 审计
117+
118+
Kubernetes [审计日志记录](/zh-cn/docs/tasks/debug/debug-cluster/audit/)提供了一组与安全相关、
119+
按时间顺序排列的记录,记录了集群中的操作序列。
120+
集群审计用户、使用 Kubernetes API 的应用程序以及控制平面本身生成的活动。
121+
122+
<!--
123+
## Cloud provider security
124+
125+
{{% thirdparty-content vendor="true" %}}
126+
127+
If you are running a Kubernetes cluster on your own hardware or a different cloud provider,
128+
consult your documentation for security best practices.
129+
Here are links to some of the popular cloud providers' security documentation:
130+
-->
131+
## 云提供商安全
132+
133+
{{% thirdparty-content vendor="true" %}}
134+
135+
如果你在自己的硬件或不同的云平台上运行 Kubernetes 集群,请参阅对应云平台的文档以了解安全最佳实践。
136+
以下是一些流行云提供商的安全文档的链接:
137+
138+
<!--
139+
{{< table caption="Cloud provider security" >}}
140+
141+
IaaS Provider | Link |
142+
-------------------- | ------------ |
143+
Alibaba Cloud | https://www.alibabacloud.com/trust-center |
144+
Amazon Web Services | https://aws.amazon.com/security |
145+
Google Cloud Platform | https://cloud.google.com/security |
146+
Huawei Cloud | https://www.huaweicloud.com/intl/en-us/securecenter/overallsafety |
147+
IBM Cloud | https://www.ibm.com/cloud/security |
148+
Microsoft Azure | https://docs.microsoft.com/en-us/azure/security/azure-security |
149+
Oracle Cloud Infrastructure | https://www.oracle.com/security |
150+
VMware vSphere | https://www.vmware.com/security/hardening-guides |
151+
152+
{{< /table >}}
153+
-->
154+
{{< table caption="Cloud provider security" >}}
155+
156+
IaaS 提供商 | 链接 |
157+
-------------------- | ------------ |
158+
阿里云 | https://www.alibabacloud.com/trust-center |
159+
亚马逊网络服务 | https://aws.amazon.com/security |
160+
谷歌云平台 | https://cloud.google.com/security |
161+
华为云 | https://www.huaweicloud.com/intl/en-us/securecenter/overallsafety |
162+
IBM 云 | https://www.ibm.com/cloud/security |
163+
微软 Azure | https://docs.microsoft.com/en-us/azure/security/azure-security |
164+
Oracle 云基础设施| https://www.oracle.com/security |
165+
VMware vSphere | https://www.vmware.com/security/hardening-guides |
166+
167+
{{< /table >}}
168+
169+
<!--
170+
## Policies
171+
172+
You can define security policies using Kubernetes-native mechanisms,
173+
such as [NetworkPolicy](/docs/concepts/services-networking/network-policies/)
174+
(declarative control over network packet filtering) or
175+
[ValidatingAdmisisonPolicy](/docs/reference/access-authn-authz/validating-admission-policy/) (declarative restrictions on what changes
176+
someone can make using the Kubernetes API).
177+
-->
178+
## 策略
179+
180+
你可以使用 Kubernetes 原生机制定义安全策略,例如
181+
[NetworkPolicy](/zh-cn/docs/concepts/services-networking/network-policies/)(对网络数据包过滤的声明式控制)
182+
[ValidatingAdmisisonPolicy](/zh-cn/docs/reference/access -authn-authz/validating-admission-policy/)
183+
(对某人可以使用 Kubernetes API 进行哪些更改的声明性限制)。
184+
185+
<!--
186+
However, you can also rely on policy implementations from the wider
187+
ecosystem around Kubernetes. Kubernetes provides extension mechanisms
188+
to let those ecosystem projects implement their own policy controls
189+
on source code review, container image approval, API access controls,
190+
networking, and more.
191+
-->
192+
你还可以依赖 Kubernetes 周边更广泛的生态系统的策略实现。
193+
Kubernetes 提供了扩展机制,让这些生态系统项目在源代码审查、
194+
容器镜像审批、API 访问控制、网络等方面实施自己的策略控制。
195+
196+
<!--
197+
For more information about policy mechanisms and Kubernetes,
198+
read [Policies](/docs/concepts/policy/).
199+
-->
200+
有关策略机制和 Kubernetes 的更多信息,请阅读[策略](/zh-cn/docs/concepts/policy/)
201+
202+
## {{% heading "whatsnext" %}}
203+
204+
<!--
205+
Learn about related Kubernetes security topics:
206+
207+
* [Securing your cluster](/docs/tasks/administer-cluster/securing-a-cluster/)
208+
* [Known vulnerabilities](/docs/reference/issues-security/official-cve-feed/)
209+
in Kubernetes (and links to further information)
210+
* [Data encryption in transit](/docs/tasks/tls/managing-tls-in-a-cluster/) for the control plane
211+
* [Data encryption at rest](/docs/tasks/administer-cluster/encrypt-data/)
212+
* [Controlling Access to the Kubernetes API](/docs/concepts/security/controlling-access)
213+
* [Network policies](/docs/concepts/services-networking/network-policies/) for Pods
214+
* [Secrets in Kubernetes](/docs/concepts/configuration/secret/)
215+
* [Pod security standards](/docs/concepts/security/pod-security-standards/)
216+
* [RuntimeClasses](/docs/concepts/containers/runtime-class)
217+
-->
218+
了解相关的 Kubernetes 安全主题:
219+
220+
* [保护集群](/zh-cn/docs/tasks/administer-cluster/secure-a-cluster/)
221+
* Kubernetes 中的[已知漏洞](/zh-cn/docs/reference/issues-security/official-cve-feed/)(以及更多信息的链接)
222+
* [传输中的数据加密](/zh-cn/docs/tasks/tls/managing-tls-in-a-cluster/)(针对控制平面)
223+
* [静态数据加密](/zh-cn/docs/tasks/administer-cluster/encrypt-data/)
224+
* [控制对 Kubernetes API 的访问](/zh-cn/docs/concepts/security/controlling-access)
225+
* Pod 的 [网络策略](/zh-cn/docs/concepts/services-networking/network-policies/)
226+
* [Kubernetes 中的 Secret](/zh-cn/docs/concepts/configuration/secret/)
227+
* [Pod 安全标准](/zh-cn/docs/concepts/security/pod-security-standards/)
228+
* [运行时类](/zh-cn/docs/concepts/containers/runtime-class)
229+
230+
<!--
231+
Learn the context:
232+
-->
233+
了解上下文:
234+
235+
<!-- if changing this, also edit the front matter of content/en/docs/concepts/security/cloud-native-security.md to match; check the no_list setting -->
236+
<!--
237+
* [Cloud Native Security and Kubernetes](/docs/concepts/security/cloud-native-security/)
238+
-->
239+
* [云原生安全和 Kubernetes](/zh-cn/docs/concepts/security/cloud-native-security/)
240+
241+
<!--
242+
Get certified:
243+
244+
* [Certified Kubernetes Security Specialist](https://training.linuxfoundation.org/certification/certified-kubernetes-security-specialist/)
245+
certification and official training course.
246+
247+
Read more in this section:
248+
-->
249+
获取认证:
250+
251+
* [Kubernetes 安全专家认证](https://training.linuxfoundation.org/certification/certified-kubernetes-security-specialist/)和官方培训课程。
252+
253+
阅读本节的更多内容:
254+

0 commit comments

Comments
 (0)