Skip to content

Commit 8472f99

Browse files
authored
Merge pull request kubernetes#49963 from aivantsov/patch-2
Update security-checklist.md
2 parents e8b4ff1 + 7adba34 commit 8472f99

File tree

1 file changed

+10
-11
lines changed

1 file changed

+10
-11
lines changed

content/en/docs/concepts/security/security-checklist.md

+10-11
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ an admin user.
5151

5252
## Network security
5353

54-
- [ ] CNI plugins in-use supports network policies.
54+
- [ ] CNI plugins in use support network policies.
5555
- [ ] Ingress and egress network policies are applied to all workloads in the
5656
cluster.
5757
- [ ] Default network policies within each namespace, selecting all pods, denying
@@ -66,9 +66,8 @@ plugins provide the functionality to
6666
restrict network resources that pods may communicate with. This is most commonly done
6767
through [Network Policies](/docs/concepts/services-networking/network-policies/)
6868
which provide a namespaced resource to define rules. Default network policies
69-
blocking everything egress and ingress, in each namespace, selecting all the
70-
pods, can be useful to adopt an allow list approach, ensuring that no workloads
71-
is missed.
69+
that block all egress and ingress, in each namespace, selecting all pods, can be
70+
useful to adopt an allow list approach to ensure that no workloads are missed.
7271

7372
Not all CNI plugins provide encryption in transit. If the chosen plugin lacks this
7473
feature, an alternative solution could be to use a service mesh to provide that
@@ -80,12 +79,12 @@ be used to communicate securely with it. The certificate authority for this
8079
should be unique to etcd.
8180

8281
External Internet access to the Kubernetes API server should be restricted to
83-
not expose the API publicly. Be careful as many managed Kubernetes distribution
82+
not expose the API publicly. Be careful, as many managed Kubernetes distributions
8483
are publicly exposing the API server by default. You can then use a bastion host
8584
to access the server.
8685

8786
The [kubelet](/docs/reference/command-line-tools-reference/kubelet/) API access
88-
should be restricted and not publicly exposed, the defaults authentication and
87+
should be restricted and not exposed publicly, the default authentication and
8988
authorization settings, when no configuration file specified with the `--config`
9089
flag, are overly permissive.
9190

@@ -325,7 +324,7 @@ Production.
325324
webhook admission controller.
326325
- [ ] The admission chain plugins and webhooks are securely configured.
327326

328-
Admission controllers can help to improve the security of the cluster. However,
327+
Admission controllers can help improve the security of the cluster. However,
329328
they can present risks themselves as they extend the API server and
330329
[should be properly secured](/blog/2022/01/19/secure-your-admission-controllers-and-webhooks/).
331330

@@ -350,11 +349,11 @@ permission to sign certificate requests.
350349
attribute') of `system:masters`.
351350

352351
[`LimitRanger`](/docs/reference/access-authn-authz/admission-controllers/#limitranger)
353-
: Enforce the LimitRange API constraints.
352+
: Enforces the LimitRange API constraints.
354353

355354
[`MutatingAdmissionWebhook`](/docs/reference/access-authn-authz/admission-controllers/#mutatingadmissionwebhook)
356355
: Allows the use of custom controllers through webhooks, these controllers may
357-
mutate requests that it reviews.
356+
mutate requests that they review.
358357

359358
[`PodSecurity`](/docs/reference/access-authn-authz/admission-controllers/#podsecurity)
360359
: Replacement for Pod Security Policy, restricts security contexts of deployed
@@ -367,8 +366,8 @@ Pods.
367366
: Allows the use of custom controllers through webhooks, these controllers do
368367
not mutate requests that it reviews.
369368

370-
The second group includes plugin that are not enabled by default but in general
371-
availability state and recommended to improve your security posture:
369+
The second group includes plugins that are not enabled by default but are in general
370+
availability state and are recommended to improve your security posture:
372371

373372
[`DenyServiceExternalIPs`](/docs/reference/access-authn-authz/admission-controllers/#denyserviceexternalips)
374373
: Rejects all net-new usage of the `Service.spec.externalIPs` field. This is a mitigation for

0 commit comments

Comments
 (0)