Skip to content

Latest commit

 

History

History
11 lines (5 loc) · 1.72 KB

File metadata and controls

11 lines (5 loc) · 1.72 KB

Security

Please note that the architecture of this solution accelerator is built for demonstration only. The provided code serves as a demonstration and is not an officially supported Microsoft offering.

If you follow the instructions in DeployAzureResources.md to deploy the services which are hosted in Azure Kubernetes Services (AKS), the services will be established with client IP range white listed based on your input to the deployment scripts. It is advised you to monitor access and scan system logs to detect unusual patterns. It is also advised that you build automation process that shut down the AKS when you are not using the services to save cost. You can manually shut down the AKS cluster for planned periods before completing the automation process. For more information on AKS, please refer to Azure Kubernetes Service (AKS).

It is advised that you add a stronger security layer, for example, with methods outlined in this article Use Azure API Management with Microservices Deployed in Azure Kubernetes Service.

You can work with your company's network and security teams to understand what existing security measures are already implemented. For example, your company may have established base-line architecture for Azure Kubernetes Services (AKS) as described in Baseline architecture for an AKS cluster - Azure Architecture Center | Microsoft Learn.