Skip to content

Commit

Permalink
Update security-checklist.md
Browse files Browse the repository at this point in the history
Correct grammar, improve wording.
  • Loading branch information
aivantsov committed Feb 28, 2025
1 parent 336d821 commit 7d02276
Showing 1 changed file with 6 additions and 7 deletions.
13 changes: 6 additions & 7 deletions content/en/docs/concepts/security/security-checklist.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ an admin user.

## Network security

- [ ] CNI plugins in-use supports network policies.
- [ ] CNI plug-ins in use support network policies.
- [ ] Ingress and egress network policies are applied to all workloads in the
cluster.
- [ ] Default network policies within each namespace, selecting all pods, denying
Expand All @@ -66,9 +66,8 @@ plugins provide the functionality to
restrict network resources that pods may communicate with. This is most commonly done
through [Network Policies](/docs/concepts/services-networking/network-policies/)
which provide a namespaced resource to define rules. Default network policies
blocking everything egress and ingress, in each namespace, selecting all the
pods, can be useful to adopt an allow list approach, ensuring that no workloads
is missed.
that block all egress and ingress, in each namespace, selecting all pods, can be
useful to adopt an allow list approach to ensure that no workloads are missed.

Not all CNI plugins provide encryption in transit. If the chosen plugin lacks this
feature, an alternative solution could be to use a service mesh to provide that
Expand All @@ -80,12 +79,12 @@ be used to communicate securely with it. The certificate authority for this
should be unique to etcd.

External Internet access to the Kubernetes API server should be restricted to
not expose the API publicly. Be careful as many managed Kubernetes distribution
not expose the API publicly. Be careful, as many managed Kubernetes distributions
are publicly exposing the API server by default. You can then use a bastion host
to access the server.

The [kubelet](/docs/reference/command-line-tools-reference/kubelet/) API access
should be restricted and not publicly exposed, the defaults authentication and
should be restricted and not exposed publicly, the default authentication and
authorization settings, when no configuration file specified with the `--config`
flag, are overly permissive.

Expand Down Expand Up @@ -325,7 +324,7 @@ Production.
webhook admission controller.
- [ ] The admission chain plugins and webhooks are securely configured.

Admission controllers can help to improve the security of the cluster. However,
Admission controllers can help improve the security of the cluster. However,
they can present risks themselves as they extend the API server and
[should be properly secured](/blog/2022/01/19/secure-your-admission-controllers-and-webhooks/).

Expand Down

0 comments on commit 7d02276

Please sign in to comment.