|
2 | 2 | title: "安全"
|
3 | 3 | weight: 85
|
4 | 4 | description: 确保云原生工作负载安全的一组概念。
|
| 5 | +simple_list: true |
5 | 6 | ---
|
| 7 | + |
| 8 | +<!-- |
| 9 | +title: "Security" |
| 10 | +weight: 85 |
| 11 | +description: > |
| 12 | + Concepts for keeping your cloud-native workload secure. |
| 13 | +simple_list: true |
| 14 | +--> |
| 15 | + |
| 16 | +<!-- |
| 17 | +This section of the Kubernetes documentation aims to help you learn to run |
| 18 | +workloads more securely, and about the essential aspects of keeping a |
| 19 | +Kubernetes cluster secure. |
| 20 | +
|
| 21 | +Kubernetes is based on a cloud-native architecture, and draws on advice from the |
| 22 | +{{< glossary_tooltip text="CNCF" term_id="cncf" >}} about good practice for |
| 23 | +cloud native information security. |
| 24 | +--> |
| 25 | +Kubernetes 文档的这一部分内容的旨在引导你学习如何更安全地运行工作负载, |
| 26 | +以及维护 Kubernetes 集群的基本安全性。 |
| 27 | + |
| 28 | +Kubernetes 基于云原生架构,并借鉴了 |
| 29 | +{{< glossary_tooltip text="CNCF" term_id="cncf" >}} 有关云原生信息安全良好实践的建议。 |
| 30 | + |
| 31 | +<!-- |
| 32 | +Read [Cloud Native Security and Kubernetes](/docs/concepts/security/cloud-native-security/) |
| 33 | +for the broader context about how to secure your cluster and the applications that |
| 34 | +you're running on it. |
| 35 | +--> |
| 36 | +请阅读[云原生安全和 Kubernetes](/zh-cn/docs/concepts/security/cloud-native-security/), |
| 37 | +了解有关如何保护集群及其上运行的应用程序的更广泛背景信息。 |
| 38 | + |
| 39 | +<!-- |
| 40 | +## Kubernetes security mechanisms {#security-mechanisms} |
| 41 | +
|
| 42 | +Kubernetes includes several APIs and security controls, as well as ways to |
| 43 | +define [policies](#policies) that can form part of how you manage information security. |
| 44 | +--> |
| 45 | +## Kubernetes 安全机制 {#security-mechanisms} |
| 46 | + |
| 47 | +Kubernetes 包含多个 API 和安全组件, |
| 48 | +以及定义[策略](#policies)的方法,这些策略可以作为你的信息安全管理的一部分。 |
| 49 | + |
| 50 | +<!-- |
| 51 | +### Control plane protection |
| 52 | +
|
| 53 | +A key security mechanism for any Kubernetes cluster is to |
| 54 | +[control access to the Kubernetes API](/docs/concepts/security/controlling-access). |
| 55 | +--> |
| 56 | +### 控制平面保护 |
| 57 | + |
| 58 | +任何 Kubernetes 集群的一个关键安全机制是[控制对 Kubernetes API 的访问](/zh-cn/docs/concepts/security/controlling-access)。 |
| 59 | + |
| 60 | +<!-- |
| 61 | +Kubernetes expects you to configure and use TLS to provide |
| 62 | +[data encryption in transit](/docs/tasks/tls/managing-tls-in-a-cluster/) |
| 63 | +within the control plane, and between the control plane and its clients. |
| 64 | +You can also enable [encryption at rest](/docs/tasks/administer-cluster/encrypt-data/) |
| 65 | +for the data stored within Kubernetes control plane; this is separate from using |
| 66 | +encryption at rest for your own workloads' data, which might also be a good idea. |
| 67 | +--> |
| 68 | +Kubernetes 希望你配置并使用 TLS, |
| 69 | +以便在控制平面内以及控制平面与其客户端之间提供[传输中的数据加密](/zh-cn/docs/tasks/tls/managing-tls-in-a-cluster/)。 |
| 70 | +你还可以为 Kubernetes 控制平面中存储的数据启用静态加密; |
| 71 | +这与对你自己的工作负载数据使用静态加密不同,后者可能也是一个好主意。 |
| 72 | + |
| 73 | +<!-- |
| 74 | +### Secrets |
| 75 | +
|
| 76 | +The [Secret](/docs/concepts/configuration/secret/) API provides basic protection for |
| 77 | +configuration values that require confidentiality. |
| 78 | +--> |
| 79 | +### Secret |
| 80 | + |
| 81 | +[Secret](/zh-cn/docs/concepts/configuration/secret/) API |
| 82 | +为需要保密的配置值提供基本保护。 |
| 83 | + |
| 84 | +<!-- |
| 85 | +### Workload protection |
| 86 | +
|
| 87 | +Enforce [Pod security standards](/docs/concepts/security/pod-security-standards/) to |
| 88 | +ensure that Pods and their containers are isolated appropriately. You can also use |
| 89 | +[RuntimeClasses](/docs/concepts/containers/runtime-class) to define custom isolation |
| 90 | +if you need it. |
| 91 | +--> |
| 92 | +### 工具负载保护 |
| 93 | + |
| 94 | +实施 [Pod 安全标准](/zh-cn/docs/concepts/security/pod-security-standards/)以确保 |
| 95 | +Pod 及其容器得到适当隔离。如果需要,你还可以使用 |
| 96 | +[RuntimeClass](/zh-cn/docs/concepts/containers/runtime-class) 来配置自定义隔离。 |
| 97 | + |
| 98 | +<!-- |
| 99 | +[Network policies](/docs/concepts/services-networking/network-policies/) let you control |
| 100 | +network traffic between Pods, or between Pods and the network outside your cluster. |
| 101 | +
|
| 102 | +You can deploy security controls from the wider ecosystem to implement preventative |
| 103 | +or detective controls around Pods, their containers, and the images that run in them. |
| 104 | +--> |
| 105 | +[网络策略(NetworkPolicy)](/zh-cn/docs/concepts/services-networking/network-policies/) |
| 106 | +可让控制 Pod 之间或 Pod 与集群外部网络之间的网络流量。 |
| 107 | + |
| 108 | +<!-- |
| 109 | +### Auditing |
| 110 | +
|
| 111 | +Kubernetes [audit logging](/docs/tasks/debug/debug-cluster/audit/) provides a |
| 112 | +security-relevant, chronological set of records documenting the sequence of actions |
| 113 | +in a cluster. The cluster audits the activities generated by users, by applications |
| 114 | +that use the Kubernetes API, and by the control plane itself. |
| 115 | +--> |
| 116 | +### 审计 |
| 117 | + |
| 118 | +Kubernetes [审计日志记录](/zh-cn/docs/tasks/debug/debug-cluster/audit/)提供了一组与安全相关、 |
| 119 | +按时间顺序排列的记录,记录了集群中的操作序列。 |
| 120 | +集群审计用户、使用 Kubernetes API 的应用程序以及控制平面本身生成的活动。 |
| 121 | + |
| 122 | +<!-- |
| 123 | +## Cloud provider security |
| 124 | +
|
| 125 | +{{% thirdparty-content vendor="true" %}} |
| 126 | +
|
| 127 | +If you are running a Kubernetes cluster on your own hardware or a different cloud provider, |
| 128 | +consult your documentation for security best practices. |
| 129 | +Here are links to some of the popular cloud providers' security documentation: |
| 130 | +--> |
| 131 | +## 云提供商安全 |
| 132 | + |
| 133 | +{{% thirdparty-content vendor="true" %}} |
| 134 | + |
| 135 | +如果你在自己的硬件或不同的云平台上运行 Kubernetes 集群,请参阅对应云平台的文档以了解安全最佳实践。 |
| 136 | +以下是一些流行云提供商的安全文档的链接: |
| 137 | + |
| 138 | +<!-- |
| 139 | +{{< table caption="Cloud provider security" >}} |
| 140 | +
|
| 141 | +IaaS Provider | Link | |
| 142 | +-------------------- | ------------ | |
| 143 | +Alibaba Cloud | https://www.alibabacloud.com/trust-center | |
| 144 | +Amazon Web Services | https://aws.amazon.com/security | |
| 145 | +Google Cloud Platform | https://cloud.google.com/security | |
| 146 | +Huawei Cloud | https://www.huaweicloud.com/intl/en-us/securecenter/overallsafety | |
| 147 | +IBM Cloud | https://www.ibm.com/cloud/security | |
| 148 | +Microsoft Azure | https://docs.microsoft.com/en-us/azure/security/azure-security | |
| 149 | +Oracle Cloud Infrastructure | https://www.oracle.com/security | |
| 150 | +VMware vSphere | https://www.vmware.com/security/hardening-guides | |
| 151 | +
|
| 152 | +{{< /table >}} |
| 153 | +--> |
| 154 | +{{< table caption="Cloud provider security" >}} |
| 155 | + |
| 156 | +IaaS 提供商 | 链接 | |
| 157 | +-------------------- | ------------ | |
| 158 | +阿里云 | https://www.alibabacloud.com/trust-center | |
| 159 | +亚马逊网络服务 | https://aws.amazon.com/security | |
| 160 | +谷歌云平台 | https://cloud.google.com/security | |
| 161 | +华为云 | https://www.huaweicloud.com/intl/en-us/securecenter/overallsafety | |
| 162 | +IBM 云 | https://www.ibm.com/cloud/security | |
| 163 | +微软 Azure | https://docs.microsoft.com/en-us/azure/security/azure-security | |
| 164 | +Oracle 云基础设施| https://www.oracle.com/security | |
| 165 | +VMware vSphere | https://www.vmware.com/security/hardening-guides | |
| 166 | + |
| 167 | +{{< /table >}} |
| 168 | + |
| 169 | +<!-- |
| 170 | +## Policies |
| 171 | +
|
| 172 | +You can define security policies using Kubernetes-native mechanisms, |
| 173 | +such as [NetworkPolicy](/docs/concepts/services-networking/network-policies/) |
| 174 | +(declarative control over network packet filtering) or |
| 175 | +[ValidatingAdmisisonPolicy](/docs/reference/access-authn-authz/validating-admission-policy/) (declarative restrictions on what changes |
| 176 | +someone can make using the Kubernetes API). |
| 177 | +--> |
| 178 | +## 策略 |
| 179 | + |
| 180 | +你可以使用 Kubernetes 原生机制定义安全策略,例如 |
| 181 | +[NetworkPolicy](/zh-cn/docs/concepts/services-networking/network-policies/)(对网络数据包过滤的声明式控制) |
| 182 | +或 [ValidatingAdmisisonPolicy](/zh-cn/docs/reference/access -authn-authz/validating-admission-policy/) |
| 183 | +(对某人可以使用 Kubernetes API 进行哪些更改的声明性限制)。 |
| 184 | + |
| 185 | +<!-- |
| 186 | +However, you can also rely on policy implementations from the wider |
| 187 | +ecosystem around Kubernetes. Kubernetes provides extension mechanisms |
| 188 | +to let those ecosystem projects implement their own policy controls |
| 189 | +on source code review, container image approval, API access controls, |
| 190 | +networking, and more. |
| 191 | +--> |
| 192 | +你还可以依赖 Kubernetes 周边更广泛的生态系统的策略实现。 |
| 193 | +Kubernetes 提供了扩展机制,让这些生态系统项目在源代码审查、 |
| 194 | +容器镜像审批、API 访问控制、网络等方面实施自己的策略控制。 |
| 195 | + |
| 196 | +<!-- |
| 197 | +For more information about policy mechanisms and Kubernetes, |
| 198 | +read [Policies](/docs/concepts/policy/). |
| 199 | +--> |
| 200 | +有关策略机制和 Kubernetes 的更多信息,请阅读[策略](/zh-cn/docs/concepts/policy/)。 |
| 201 | + |
| 202 | +## {{% heading "whatsnext" %}} |
| 203 | + |
| 204 | +<!-- |
| 205 | +Learn about related Kubernetes security topics: |
| 206 | +
|
| 207 | +* [Securing your cluster](/docs/tasks/administer-cluster/securing-a-cluster/) |
| 208 | +* [Known vulnerabilities](/docs/reference/issues-security/official-cve-feed/) |
| 209 | + in Kubernetes (and links to further information) |
| 210 | +* [Data encryption in transit](/docs/tasks/tls/managing-tls-in-a-cluster/) for the control plane |
| 211 | +* [Data encryption at rest](/docs/tasks/administer-cluster/encrypt-data/) |
| 212 | +* [Controlling Access to the Kubernetes API](/docs/concepts/security/controlling-access) |
| 213 | +* [Network policies](/docs/concepts/services-networking/network-policies/) for Pods |
| 214 | +* [Secrets in Kubernetes](/docs/concepts/configuration/secret/) |
| 215 | +* [Pod security standards](/docs/concepts/security/pod-security-standards/) |
| 216 | +* [RuntimeClasses](/docs/concepts/containers/runtime-class) |
| 217 | +--> |
| 218 | +了解相关的 Kubernetes 安全主题: |
| 219 | + |
| 220 | +* [保护集群](/zh-cn/docs/tasks/administer-cluster/secure-a-cluster/) |
| 221 | +* Kubernetes 中的[已知漏洞](/zh-cn/docs/reference/issues-security/official-cve-feed/)(以及更多信息的链接) |
| 222 | +* [传输中的数据加密](/zh-cn/docs/tasks/tls/managing-tls-in-a-cluster/)(针对控制平面) |
| 223 | +* [静态数据加密](/zh-cn/docs/tasks/administer-cluster/encrypt-data/) |
| 224 | +* [控制对 Kubernetes API 的访问](/zh-cn/docs/concepts/security/controlling-access) |
| 225 | +* Pod 的 [网络策略](/zh-cn/docs/concepts/services-networking/network-policies/) |
| 226 | +* [Kubernetes 中的 Secret](/zh-cn/docs/concepts/configuration/secret/) |
| 227 | +* [Pod 安全标准](/zh-cn/docs/concepts/security/pod-security-standards/) |
| 228 | +* [运行时类](/zh-cn/docs/concepts/containers/runtime-class) |
| 229 | + |
| 230 | +<!-- |
| 231 | +Learn the context: |
| 232 | +--> |
| 233 | +了解上下文: |
| 234 | + |
| 235 | +<!-- if changing this, also edit the front matter of content/en/docs/concepts/security/cloud-native-security.md to match; check the no_list setting --> |
| 236 | +<!-- |
| 237 | +* [Cloud Native Security and Kubernetes](/docs/concepts/security/cloud-native-security/) |
| 238 | +--> |
| 239 | +* [云原生安全和 Kubernetes](/zh-cn/docs/concepts/security/cloud-native-security/) |
| 240 | + |
| 241 | +<!-- |
| 242 | +Get certified: |
| 243 | +
|
| 244 | +* [Certified Kubernetes Security Specialist](https://training.linuxfoundation.org/certification/certified-kubernetes-security-specialist/) |
| 245 | + certification and official training course. |
| 246 | +
|
| 247 | +Read more in this section: |
| 248 | +--> |
| 249 | +获取认证: |
| 250 | + |
| 251 | +* [Kubernetes 安全专家认证](https://training.linuxfoundation.org/certification/certified-kubernetes-security-specialist/)和官方培训课程。 |
| 252 | + |
| 253 | +阅读本节的更多内容: |
| 254 | + |
0 commit comments