@@ -51,7 +51,7 @@ an admin user.
51
51
52
52
## Network security
53
53
54
- - [ ] CNI plugins in- use supports network policies.
54
+ - [ ] CNI plugins in use support network policies.
55
55
- [ ] Ingress and egress network policies are applied to all workloads in the
56
56
cluster.
57
57
- [ ] Default network policies within each namespace, selecting all pods, denying
@@ -66,9 +66,8 @@ plugins provide the functionality to
66
66
restrict network resources that pods may communicate with. This is most commonly done
67
67
through [ Network Policies] ( /docs/concepts/services-networking/network-policies/ )
68
68
which provide a namespaced resource to define rules. Default network policies
69
- blocking everything egress and ingress, in each namespace, selecting all the
70
- pods, can be useful to adopt an allow list approach, ensuring that no workloads
71
- is missed.
69
+ that block all egress and ingress, in each namespace, selecting all pods, can be
70
+ useful to adopt an allow list approach to ensure that no workloads are missed.
72
71
73
72
Not all CNI plugins provide encryption in transit. If the chosen plugin lacks this
74
73
feature, an alternative solution could be to use a service mesh to provide that
@@ -80,12 +79,12 @@ be used to communicate securely with it. The certificate authority for this
80
79
should be unique to etcd.
81
80
82
81
External Internet access to the Kubernetes API server should be restricted to
83
- not expose the API publicly. Be careful as many managed Kubernetes distribution
82
+ not expose the API publicly. Be careful, as many managed Kubernetes distributions
84
83
are publicly exposing the API server by default. You can then use a bastion host
85
84
to access the server.
86
85
87
86
The [ kubelet] ( /docs/reference/command-line-tools-reference/kubelet/ ) API access
88
- should be restricted and not publicly exposed, the defaults authentication and
87
+ should be restricted and not exposed publicly , the default authentication and
89
88
authorization settings, when no configuration file specified with the ` --config `
90
89
flag, are overly permissive.
91
90
@@ -325,7 +324,7 @@ Production.
325
324
webhook admission controller.
326
325
- [ ] The admission chain plugins and webhooks are securely configured.
327
326
328
- Admission controllers can help to improve the security of the cluster. However,
327
+ Admission controllers can help improve the security of the cluster. However,
329
328
they can present risks themselves as they extend the API server and
330
329
[ should be properly secured] ( /blog/2022/01/19/secure-your-admission-controllers-and-webhooks/ ) .
331
330
@@ -350,11 +349,11 @@ permission to sign certificate requests.
350
349
attribute') of ` system:masters ` .
351
350
352
351
[ ` LimitRanger ` ] ( /docs/reference/access-authn-authz/admission-controllers/#limitranger )
353
- : Enforce the LimitRange API constraints.
352
+ : Enforces the LimitRange API constraints.
354
353
355
354
[ ` MutatingAdmissionWebhook ` ] ( /docs/reference/access-authn-authz/admission-controllers/#mutatingadmissionwebhook )
356
355
: Allows the use of custom controllers through webhooks, these controllers may
357
- mutate requests that it reviews .
356
+ mutate requests that they review .
358
357
359
358
[ ` PodSecurity ` ] ( /docs/reference/access-authn-authz/admission-controllers/#podsecurity )
360
359
: Replacement for Pod Security Policy, restricts security contexts of deployed
@@ -367,8 +366,8 @@ Pods.
367
366
: Allows the use of custom controllers through webhooks, these controllers do
368
367
not mutate requests that it reviews.
369
368
370
- The second group includes plugin that are not enabled by default but in general
371
- availability state and recommended to improve your security posture:
369
+ The second group includes plugins that are not enabled by default but are in general
370
+ availability state and are recommended to improve your security posture:
372
371
373
372
[ ` DenyServiceExternalIPs ` ] ( /docs/reference/access-authn-authz/admission-controllers/#denyserviceexternalips )
374
373
: Rejects all net-new usage of the ` Service.spec.externalIPs ` field. This is a mitigation for
0 commit comments