Proposed Pull Request Change

title titleSuffix description ms.topic ms.custom ms.date author ms.author
Best practices for cluster security Azure Kubernetes Service Learn the cluster operator best practices for how to manage cluster security and upgrades in Azure Kubernetes Service (AKS) best-practice linux-related-content 03/02/2023 davidsmatlak davidsmatlak
📄 Document Links
GitHub View on GitHub Microsoft Learn View on Microsoft Learn
Content Truncation Detected
The generated rewrite appears to be incomplete.
Original lines: -
Output lines: -
Ratio: -
Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
+0 -0
+0 -0
--- title: Best practices for cluster security titleSuffix: Azure Kubernetes Service description: Learn the cluster operator best practices for how to manage cluster security and upgrades in Azure Kubernetes Service (AKS) ms.topic: best-practice ms.custom: linux-related-content ms.date: 03/02/2023 author: davidsmatlak ms.author: davidsmatlak # Customer intent: As a cluster operator, I want to implement best practices for securing my Kubernetes clusters and managing upgrades, so that I can minimize security risks and ensure compliance with operational standards. --- # Best practices for cluster security and upgrades in Azure Kubernetes Service (AKS) As you manage clusters in Azure Kubernetes Service (AKS), workload and data security is a key consideration. When you run multi-tenant clusters using logical isolation, you especially need to secure resource and workload access. Minimize the risk of attack by applying the latest Kubernetes and node OS security updates. This article focuses on how to secure your AKS cluster. You learn how to: > [!div class="checklist"] > * Use Microsoft Entra ID and Kubernetes role-based access control (Kubernetes RBAC) to secure API server access. > * Secure container access to node resources. > * Upgrade an AKS cluster to the latest Kubernetes version. > * Keep nodes up to date and automatically apply security patches. You can also read the best practices for [container image management][best-practices-container-image-management] and for [pod security][best-practices-pod-security]. ## Enable threat protection > **Best practice guidance** > > You can enable [Defender for Containers](/azure/defender-for-cloud/defender-for-containers-introduction) to help secure your containers. Defender for Containers can assess cluster configurations and provide security recommendations, run vulnerability scans, and provide real-time protection and alerting for Kubernetes nodes and clusters. ## Secure access to the API server and cluster nodes > **Best practice guidance** > > One of the most important ways to secure your cluster is to secure access to the Kubernetes API server. To control access to the API server, integrate Kubernetes RBAC with Microsoft Entra ID. With these controls,you secure AKS the same way that you secure access to your Azure subscriptions. The Kubernetes API server provides a single connection point for requests to perform actions within a cluster. To secure and audit access to the API server, limit access and provide the lowest possible permission levels. while this approach isn't unique to Kubernetes, it's especially important when you've logically isolated your AKS cluster for multi-tenant use. Microsoft Entra ID provides an enterprise-ready identity management solution that integrates with AKS clusters. Since Kubernetes doesn't provide an identity management solution, you may be hard-pressed to granularly restrict access to the API server. With Microsoft Entra integrated clusters in AKS, you use your existing user and group accounts to authenticate users to the API server. ![Microsoft Entra integration for AKS clusters](media/operator-best-practices-cluster-security/aad-integration.png) Using Kubernetes RBAC and Microsoft Entra ID-integration, you can secure the API server and provide the minimum permissions required to a scoped resource set, like a single namespace. You can grant different Microsoft Entra users or groups different Kubernetes roles. With granular permissions, you can restrict access to the API server and provide a clear audit trail of actions performed. The recommended best practice is to use *groups* to provide access to files and folders instead of individual identities. For example, use a Microsoft Entra ID *group* membership to bind users to Kubernetes roles rather than individual *users*. As a user's group membership changes, their access permissions on the AKS cluster change accordingly. Meanwhile, let's say you bind the individual user directly to a role and their job function changes. While the Microsoft Entra group memberships update, their permissions on the AKS cluster would not. In this scenario, the user ends up with more permissions than they require. For more information about Microsoft Entra integration, Kubernetes RBAC, and Azure RBAC, see [Best practices for authentication and authorization in AKS][aks-best-practices-identity]. ## Restrict access to Instance Metadata API > **Best practice guidance** > > Add a network policy in all user namespaces to block pod egress to the metadata endpoint. > [!NOTE] > To implement Network Policy, include the attribute `--network-policy azure` when creating the AKS cluster. Use the following command to create the cluster: > `az aks create -g myResourceGroup -n myManagedCluster --network-plugin azure --network-policy azure --generate-ssh-keys` ```yaml apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: restrict-instance-metadata spec: podSelector: matchLabels: {} policyTypes: - Egress egress: - to: - ipBlock: cidr: 10.10.0.0/0#example except: - 169.254.169.254/32 ``` ## Secure container access to resources > **Best practice guidance** > > Limit access to actions that containers can perform. Provide the least number of permissions, and avoid the use of root access or privileged escalation. In the same way that you should grant users or groups the minimum privileges required, you should also limit containers to only necessary actions and processes. To minimize the risk of attack, avoid configuring applications and containers that require escalated privileges or root access. Using user-namespaces, you improve the host isolation and limit the lateral movement in case of container breakouts. These improvements are significant whether the pod is running as root or not. For even more granular control of container actions, you can also use built-in Linux security features such as *AppArmor* and *seccomp*. For more information, see [Secure container access to resources][secure-container-access]. ## Regularly update to the latest version of Kubernetes > **Best practice guidance** > > To stay current on new features and bug fixes, regularly upgrade the Kubernetes version in your AKS cluster. Kubernetes releases new features at a quicker pace than more traditional infrastructure platforms. Kubernetes updates include: * New features * Bug or security fixes New features typically move through *alpha* and *beta* status before they become *stable*. Once stable, are generally available and recommended for production use. Kubernetes new feature release cycle allows you to update Kubernetes without regularly encountering breaking changes or adjusting your deployments and templates. AKS supports three minor versions of Kubernetes. Once a new minor patch version is introduced, the oldest minor version and patch releases supported are retired. Minor Kubernetes updates happen on a periodic basis. To stay within support, ensure you have a governance process to check for necessary upgrades. For more information, see [Supported Kubernetes versions AKS][aks-supported-versions]. ### [Azure CLI](#tab/azure-cli) To check the versions that are available for your cluster, use the [az aks get-upgrades][az-aks-get-upgrades] command as shown in the following example: ```azurecli-interactive az aks get-upgrades --resource-group myResourceGroup --name myAKSCluster --output table ``` You can then upgrade your AKS cluster using the [az aks upgrade][az-aks-upgrade] command. The upgrade process safely: * Cordons and drains one node at a time. * Schedules pods on remaining nodes. * Deploys a new node running the latest OS and Kubernetes versions. ### [Azure PowerShell](#tab/azure-powershell) To check the versions that are available for your cluster, use the [Get-AzAksUpgradeProfile][get-azaksupgradeprofile] cmdlet as shown in the following example: ```azurepowershell-interactive Get-AzAksUpgradeProfile -ResourceGroupName myResourceGroup -ClusterName myAKSCluster | Select-Object -Property Name, ControlPlaneProfileKubernetesVersion -ExpandProperty ControlPlaneProfileUpgrade | Format-Table -Property * ``` You can then upgrade your AKS cluster using the [Set-AzAksCluster][set-azakscluster] command. The upgrade process safely: * Cordons and drains one node at a time. * Schedules pods on remaining nodes. * Deploys a new node running the latest OS and Kubernetes versions. --- >[!IMPORTANT] > Test new minor versions in a dev test environment and validate that your workload remains healthy with the new Kubernetes version. > > Kubernetes may deprecate APIs (like in version 1.16) that your workloads rely on. When bringing new versions into production, consider using [multiple node pools on separate versions](create-node-pools.md) and upgrade individual pools one at a time to progressively roll the update across a cluster. If running multiple clusters, upgrade one cluster at a time to progressively monitor for impact or changes. > > ### [Azure CLI](#tab/azure-cli) > > ```azurecli-interactive > az aks upgrade --resource-group myResourceGroup --name myAKSCluster --kubernetes-version KUBERNETES_VERSION > ``` > > ### [Azure PowerShell](#tab/azure-powershell) > > ```azurepowershell-interactive > Set-AzAksCluster -ResourceGroupName myResourceGroup -Name myAKSCluster -KubernetesVersion <KUBERNETES_VERSION> > ``` > > --- For more information about upgrades in AKS, see [Supported Kubernetes versions in AKS][aks-supported-versions] and [Upgrade an AKS cluster][aks-upgrade]. ## Process Linux node updates Each evening, Linux nodes in AKS get security patches through their distro update channel. This behavior is automatically configured as the nodes are deployed in an AKS cluster. To minimize disruption and potential impact to running workloads, nodes are not automatically rebooted if a security patch or kernel update requires it. For more information about how to handle node reboots, see [Apply security and kernel updates to nodes in AKS][aks-kured]. ### Node image upgrades Unattended upgrades apply updates to the Linux node OS, but the image used to create nodes for your cluster remains unchanged. If a new Linux node is added to your cluster, the original image is used to create the node. This new node will receive all the security and kernel updates available during the automatic check every night but will remain unpatched until all checks and restarts are complete. You can use node image upgrade to check for and update node images used by your cluster. For more information on node image upgrade, see [Azure Kubernetes Service (AKS) node image upgrade][node-image-upgrade]. ## Process Windows Server node updates For Windows Server nodes, regularly perform a node image upgrade operation to safely cordon and drain pods and deploy updated nodes. <!-- EXTERNAL LINKS --> [k8s-apparmor]: https://kubernetes.io/docs/tutorials/clusters/apparmor/ [seccomp]: https://kubernetes.io/docs/reference/node/seccomp/ [kubectl-apply]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#apply [kubectl-exec]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#exec [kubectl-get]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#get <!-- INTERNAL LINKS --> [az-aks-get-upgrades]: /cli/azure/aks#az-aks-get-upgrades [get-azaksupgradeprofile]: /powershell/module/az.aks/get-azaksupgradeprofile [az-aks-upgrade]: /cli/azure/aks#az-aks-upgrade [set-azakscluster]: /powershell/module/az.aks/set-azakscluster [aks-supported-versions]: supported-kubernetes-versions.md [aks-upgrade]: upgrade-cluster.md [aks-best-practices-identity]: concepts-identity.md [aks-kured]: node-updates-kured.md [aks-aad]: ./azure-ad-integration-cli.md [best-practices-container-image-management]: operator-best-practices-container-image-management.md [best-practices-pod-security]: developer-best-practices-pod-security.md [pod-security-contexts]: developer-best-practices-pod-security.md#secure-pod-access-to-resources [aks-ssh]: ssh.md [security-center-aks]: ../defender-for-cloud/defender-for-kubernetes-introduction.md [node-image-upgrade]: node-image-upgrade.md [workload-identity-overview]: workload-identity-overview.md [secure-container-access]: secure-container-access.md
Success! Branch created successfully. Create Pull Request on GitHub
Error: