New Report - State of Container and Kubernetes Security Winter 2020 Download Now
{ .link_text }}

Posts under Azure Security

Azure Kubernetes (AKS) Security Best Practices Part 2 of 4

Azure Kubernetes (AKS) Security Best Practices Part 2 of 4

In part one of this series on Azure Kubernetes Service (AKS) security best practices, we covered how to plan and create AKS clusters to enable crucial Kubernetes security features like RBAC and network policies. We also discussed best practices for creating secure images to deploy to your AKS cluster and the need for performing regular vulnerability scans on those images. This post will cover topics related to the networking infrastructure of AKS clusters and suggestions for locking those networks down to protect against external attacks and internal misconfigurations of a cluster’s workloads.