Skip to content

Latest commit

 

History

History
32 lines (20 loc) · 1.01 KB

02-Kubernetes-Security-Primitives.md

File metadata and controls

32 lines (20 loc) · 1.01 KB

Kubernetes Security Primitives

In this section, we will take a look at kubernetes security primitives

Secure Hosts

sech

Secure Kubernetes

  • We need to make two types of decisions.

    • Who can access?
    • What can they do?

    seck

Authentication

  • Who can access the API Server is defined by the Authentication mechanisms.

Authorization

  • Once they gain access to the cluster, what they can do is defined by authorization mechanisms.

TLS Certificates

  • All communication with the cluster, between the various components such as the ETCD Cluster, kube-controller-manager, scheduler, api server, as well as those running on the working nodes such as the kubelet and kubeproxy is secured using TLS encryption.

tls

Network Policies

What about communication between applications within the cluster?

np