SlideShare a Scribd company logo
AKS Cluster Management
Security
Dear Azure Webinar
Meet our speaker
Stefano Tempesta
CTO @ SXiQ
@stefanotempesta
AKS cluster concepts
Access and identity
Security concepts for applications and clusters
Best practices
Authentication and authorization
Cluster security
Kubernetes core concepts
Nodes and node pools
Access and identity
Security concepts for applications and clusters
Master components security
Node security
Cluster upgrades
Network security
Kubernetes Secrets
https://github.com/weaveworks/kured
https://kubernetes.io/docs/concepts/
configuration/secret/
Best practices for Authentication and authorization
Authenticate AKS cluster users with Azure Active Directory
Control access to resources with role-based access controls (RBAC)
Use a managed identity to authenticate themselves with other services
Azure Active Directory
Best practices for Authentication and authorization
Role-based access controls (RBAC)
Create a Role with full access Create a RoleBinding for the Azure AD user
Best practices for Authentication and authorization
Pod identities
Best practices for cluster security
Secure access to the API server and cluster nodes
Best practices for cluster security
Secure container access to resources
Best practices for cluster security
Regularly update to the latest version of Kubernetes
Check the versions that are available for your cluster
Upgrade your AKS cluster
Best practices for cluster security
Process Linux node updates and reboots using kured
Learning path
aka.ms/LearnKubernetes
What is Kubernetes
aka.ms/k8sLearning
Hear from experts
aka.ms/AKS/videos
Case studies
aka.ms/aks/casestudy
Azure Kubernetes Service
aka.ms/AKS/page
Try for free
aka.ms/aks/trial
Resources
Q&A

More Related Content

What's hot (19)

Docker & Apcera Better Together
Docker & Apcera Better TogetherDocker & Apcera Better Together
Docker & Apcera Better Together
Simone Morellato
 
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
Lacework
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security Strategy
Teri Radichel
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017
kieranjacobsen
 
IT Camp 19: Top Azure security fails and how to avoid them
IT Camp 19: Top Azure security fails and how to avoid themIT Camp 19: Top Azure security fails and how to avoid them
IT Camp 19: Top Azure security fails and how to avoid them
Karl Ots
 
EKS security best practices
EKS security best practicesEKS security best practices
EKS security best practices
John Varghese
 
OpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information ExchangeOpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information Exchange
Cybera Inc.
 
Linux Administration Training | Linux Administration Will Never Go Out Of Fas...
Linux Administration Training | Linux Administration Will Never Go Out Of Fas...Linux Administration Training | Linux Administration Will Never Go Out Of Fas...
Linux Administration Training | Linux Administration Will Never Go Out Of Fas...
Edureka!
 
All Your Containers Are Belong To Us
All Your Containers Are Belong To UsAll Your Containers Are Belong To Us
All Your Containers Are Belong To Us
Lacework
 
Micro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservicesMicro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservices
Anthony Chow
 
Lacework Kubernetes Meetup | August 28, 2018
Lacework Kubernetes Meetup | August 28, 2018Lacework Kubernetes Meetup | August 28, 2018
Lacework Kubernetes Meetup | August 28, 2018
Lacework
 
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
Karl Ots
 
DevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid themDevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid them
Karl Ots
 
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloudAptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
Aptible
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby Steps
Priyanka Aash
 
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Davide Benvegnù
 
Demystifying microservices inside Azure AKS ITDays Radu Vunvulea 2018
 Demystifying microservices inside Azure AKS ITDays Radu Vunvulea 2018 Demystifying microservices inside Azure AKS ITDays Radu Vunvulea 2018
Demystifying microservices inside Azure AKS ITDays Radu Vunvulea 2018
Radu Vunvulea
 
Demystifying microservices inside Azure AKS Codecamp Radu Vunvulea 2018
 Demystifying microservices inside Azure AKS Codecamp Radu Vunvulea 2018 Demystifying microservices inside Azure AKS Codecamp Radu Vunvulea 2018
Demystifying microservices inside Azure AKS Codecamp Radu Vunvulea 2018
Radu Vunvulea
 
Containerization with Azure
Containerization with AzureContainerization with Azure
Containerization with Azure
Pranav Ainavolu
 
Docker & Apcera Better Together
Docker & Apcera Better TogetherDocker & Apcera Better Together
Docker & Apcera Better Together
Simone Morellato
 
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
Lacework
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security Strategy
Teri Radichel
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017
kieranjacobsen
 
IT Camp 19: Top Azure security fails and how to avoid them
IT Camp 19: Top Azure security fails and how to avoid themIT Camp 19: Top Azure security fails and how to avoid them
IT Camp 19: Top Azure security fails and how to avoid them
Karl Ots
 
EKS security best practices
EKS security best practicesEKS security best practices
EKS security best practices
John Varghese
 
OpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information ExchangeOpenStack - Security Professionals Information Exchange
OpenStack - Security Professionals Information Exchange
Cybera Inc.
 
Linux Administration Training | Linux Administration Will Never Go Out Of Fas...
Linux Administration Training | Linux Administration Will Never Go Out Of Fas...Linux Administration Training | Linux Administration Will Never Go Out Of Fas...
Linux Administration Training | Linux Administration Will Never Go Out Of Fas...
Edureka!
 
All Your Containers Are Belong To Us
All Your Containers Are Belong To UsAll Your Containers Are Belong To Us
All Your Containers Are Belong To Us
Lacework
 
Micro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservicesMicro segmentation – a perfect fit for microservices
Micro segmentation – a perfect fit for microservices
Anthony Chow
 
Lacework Kubernetes Meetup | August 28, 2018
Lacework Kubernetes Meetup | August 28, 2018Lacework Kubernetes Meetup | August 28, 2018
Lacework Kubernetes Meetup | August 28, 2018
Lacework
 
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
Karl Ots
 
DevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid themDevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid them
Karl Ots
 
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloudAptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
Aptible, AWS, and Telepharm: Architecting HIPAA compliance for the cloud
Aptible
 
DevSecOps in Baby Steps
DevSecOps in Baby StepsDevSecOps in Baby Steps
DevSecOps in Baby Steps
Priyanka Aash
 
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Consolidating Infrastructure with Azure Kubernetes Service - MS Online Tech F...
Davide Benvegnù
 
Demystifying microservices inside Azure AKS ITDays Radu Vunvulea 2018
 Demystifying microservices inside Azure AKS ITDays Radu Vunvulea 2018 Demystifying microservices inside Azure AKS ITDays Radu Vunvulea 2018
Demystifying microservices inside Azure AKS ITDays Radu Vunvulea 2018
Radu Vunvulea
 
Demystifying microservices inside Azure AKS Codecamp Radu Vunvulea 2018
 Demystifying microservices inside Azure AKS Codecamp Radu Vunvulea 2018 Demystifying microservices inside Azure AKS Codecamp Radu Vunvulea 2018
Demystifying microservices inside Azure AKS Codecamp Radu Vunvulea 2018
Radu Vunvulea
 
Containerization with Azure
Containerization with AzureContainerization with Azure
Containerization with Azure
Pranav Ainavolu
 

Similar to Best Practices to Secure Your Kubernetes Cluster (20)

AKS Scurity - Cluster & Kubelet Access to services
AKS Scurity - Cluster & Kubelet Access to servicesAKS Scurity - Cluster & Kubelet Access to services
AKS Scurity - Cluster & Kubelet Access to services
Parisa Moosavinezhad
 
Azure Zürich User Group: Azure Kubernetes Service – more than just a managed ...
Azure Zürich User Group: Azure Kubernetes Service – more than just a managed ...Azure Zürich User Group: Azure Kubernetes Service – more than just a managed ...
Azure Zürich User Group: Azure Kubernetes Service – more than just a managed ...
Nico Meisenzahl
 
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for KubernetesGDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
James Anderson
 
DevSecOps in a cloudnative world
DevSecOps in a cloudnative worldDevSecOps in a cloudnative world
DevSecOps in a cloudnative world
Karthik Gaekwad
 
k8s-on-azure
 k8s-on-azure k8s-on-azure
k8s-on-azure
Ganesh Pol
 
Azure Kubernetes Service 2019 ふりかえり
Azure Kubernetes Service 2019 ふりかえりAzure Kubernetes Service 2019 ふりかえり
Azure Kubernetes Service 2019 ふりかえり
Toru Makabe
 
Kubernetes - Security Journey
Kubernetes - Security JourneyKubernetes - Security Journey
Kubernetes - Security Journey
Jerry Jalava
 
Compute Security - Container Security
Compute Security - Container SecurityCompute Security - Container Security
Compute Security - Container Security
Eng Teong Cheah
 
Hardening Kubernetes Cluster
Hardening Kubernetes ClusterHardening Kubernetes Cluster
Hardening Kubernetes Cluster
Knoldus Inc.
 
Kubernetes security with AWS
Kubernetes security with AWSKubernetes security with AWS
Kubernetes security with AWS
Kasun Madura Rathnayaka
 
10 tips for Cloud Native Security
10 tips for Cloud Native Security10 tips for Cloud Native Security
10 tips for Cloud Native Security
Karthik Gaekwad
 
Demystifying Kubernetes Security using AWS EKS
Demystifying Kubernetes Security using AWS EKSDemystifying Kubernetes Security using AWS EKS
Demystifying Kubernetes Security using AWS EKS
Ankit Rao
 
Best Practices with Azure Kubernetes Services
Best Practices with Azure Kubernetes ServicesBest Practices with Azure Kubernetes Services
Best Practices with Azure Kubernetes Services
QAware GmbH
 
12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster
Suman Chakraborty
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
Katia Himeur Talhi
 
Kubernetes #3 security
Kubernetes #3   securityKubernetes #3   security
Kubernetes #3 security
Terry Cho
 
Securing your Kubernetes cluster : a step-by-step guide to success! (v2)
Securing your Kubernetes cluster : a step-by-step guide to success! (v2)Securing your Kubernetes cluster : a step-by-step guide to success! (v2)
Securing your Kubernetes cluster : a step-by-step guide to success! (v2)
Katia Himeur Talhi
 
Top 13 best security practices
Top 13 best security practicesTop 13 best security practices
Top 13 best security practices
Radu Vunvulea
 
KubeSecOps
KubeSecOpsKubeSecOps
KubeSecOps
Karthik Gaekwad
 
Preventing Noisy and Nosy Neighbors Infographic
Preventing Noisy and Nosy Neighbors InfographicPreventing Noisy and Nosy Neighbors Infographic
Preventing Noisy and Nosy Neighbors Infographic
Alex Hisaka
 
AKS Scurity - Cluster & Kubelet Access to services
AKS Scurity - Cluster & Kubelet Access to servicesAKS Scurity - Cluster & Kubelet Access to services
AKS Scurity - Cluster & Kubelet Access to services
Parisa Moosavinezhad
 
Azure Zürich User Group: Azure Kubernetes Service – more than just a managed ...
Azure Zürich User Group: Azure Kubernetes Service – more than just a managed ...Azure Zürich User Group: Azure Kubernetes Service – more than just a managed ...
Azure Zürich User Group: Azure Kubernetes Service – more than just a managed ...
Nico Meisenzahl
 
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for KubernetesGDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes
James Anderson
 
DevSecOps in a cloudnative world
DevSecOps in a cloudnative worldDevSecOps in a cloudnative world
DevSecOps in a cloudnative world
Karthik Gaekwad
 
Azure Kubernetes Service 2019 ふりかえり
Azure Kubernetes Service 2019 ふりかえりAzure Kubernetes Service 2019 ふりかえり
Azure Kubernetes Service 2019 ふりかえり
Toru Makabe
 
Kubernetes - Security Journey
Kubernetes - Security JourneyKubernetes - Security Journey
Kubernetes - Security Journey
Jerry Jalava
 
Compute Security - Container Security
Compute Security - Container SecurityCompute Security - Container Security
Compute Security - Container Security
Eng Teong Cheah
 
Hardening Kubernetes Cluster
Hardening Kubernetes ClusterHardening Kubernetes Cluster
Hardening Kubernetes Cluster
Knoldus Inc.
 
10 tips for Cloud Native Security
10 tips for Cloud Native Security10 tips for Cloud Native Security
10 tips for Cloud Native Security
Karthik Gaekwad
 
Demystifying Kubernetes Security using AWS EKS
Demystifying Kubernetes Security using AWS EKSDemystifying Kubernetes Security using AWS EKS
Demystifying Kubernetes Security using AWS EKS
Ankit Rao
 
Best Practices with Azure Kubernetes Services
Best Practices with Azure Kubernetes ServicesBest Practices with Azure Kubernetes Services
Best Practices with Azure Kubernetes Services
QAware GmbH
 
12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster12 Ways Not to get 'Hacked' your Kubernetes Cluster
12 Ways Not to get 'Hacked' your Kubernetes Cluster
Suman Chakraborty
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
Katia Himeur Talhi
 
Kubernetes #3 security
Kubernetes #3   securityKubernetes #3   security
Kubernetes #3 security
Terry Cho
 
Securing your Kubernetes cluster : a step-by-step guide to success! (v2)
Securing your Kubernetes cluster : a step-by-step guide to success! (v2)Securing your Kubernetes cluster : a step-by-step guide to success! (v2)
Securing your Kubernetes cluster : a step-by-step guide to success! (v2)
Katia Himeur Talhi
 
Top 13 best security practices
Top 13 best security practicesTop 13 best security practices
Top 13 best security practices
Radu Vunvulea
 
Preventing Noisy and Nosy Neighbors Infographic
Preventing Noisy and Nosy Neighbors InfographicPreventing Noisy and Nosy Neighbors Infographic
Preventing Noisy and Nosy Neighbors Infographic
Alex Hisaka
 

More from Stefano Tempesta (20)

Robotics & AI User Group - Smart City
Robotics & AI User Group - Smart CityRobotics & AI User Group - Smart City
Robotics & AI User Group - Smart City
Stefano Tempesta
 
Robotics & AI User Group - Computer Vision - Azure Kinect
Robotics & AI User Group - Computer Vision - Azure KinectRobotics & AI User Group - Computer Vision - Azure Kinect
Robotics & AI User Group - Computer Vision - Azure Kinect
Stefano Tempesta
 
Virtual eye vision with HoloLens
Virtual eye vision with HoloLensVirtual eye vision with HoloLens
Virtual eye vision with HoloLens
Stefano Tempesta
 
Design Patterns for Distributed Systems in Azure Kubernetes Service
Design Patterns for Distributed Systems in Azure Kubernetes ServiceDesign Patterns for Distributed Systems in Azure Kubernetes Service
Design Patterns for Distributed Systems in Azure Kubernetes Service
Stefano Tempesta
 
Measure your teams sentiment
Measure your teams sentimentMeasure your teams sentiment
Measure your teams sentiment
Stefano Tempesta
 
Electronic signature with blockchain
Electronic signature with blockchainElectronic signature with blockchain
Electronic signature with blockchain
Stefano Tempesta
 
Azure Cost Management
Azure Cost ManagementAzure Cost Management
Azure Cost Management
Stefano Tempesta
 
Automate Blockchain Workflows
Automate Blockchain WorkflowsAutomate Blockchain Workflows
Automate Blockchain Workflows
Stefano Tempesta
 
Expert Network - Machine Learning Tech Days
Expert Network - Machine Learning Tech DaysExpert Network - Machine Learning Tech Days
Expert Network - Machine Learning Tech Days
Stefano Tempesta
 
Expert Network - Financial Predictions with Machine Learning
Expert Network - Financial Predictions with Machine LearningExpert Network - Financial Predictions with Machine Learning
Expert Network - Financial Predictions with Machine Learning
Stefano Tempesta
 
Designing and Building Decentralized Blockchain Apps
Designing and Building Decentralized Blockchain AppsDesigning and Building Decentralized Blockchain Apps
Designing and Building Decentralized Blockchain Apps
Stefano Tempesta
 
Build Better CRM Charts
Build Better CRM ChartsBuild Better CRM Charts
Build Better CRM Charts
Stefano Tempesta
 
Azure Blockchain
Azure BlockchainAzure Blockchain
Azure Blockchain
Stefano Tempesta
 
Smart Unified Service Desk with Machine Learning
Smart Unified Service Desk with Machine LearningSmart Unified Service Desk with Machine Learning
Smart Unified Service Desk with Machine Learning
Stefano Tempesta
 
Introduction to Dynamics 365 for Talent
Introduction to Dynamics 365 for TalentIntroduction to Dynamics 365 for Talent
Introduction to Dynamics 365 for Talent
Stefano Tempesta
 
Dynamics 365 Saturday Dubai 2018
Dynamics 365 Saturday Dubai 2018Dynamics 365 Saturday Dubai 2018
Dynamics 365 Saturday Dubai 2018
Stefano Tempesta
 
Applied Machine Learning Days Lausanne 2018
Applied Machine Learning Days Lausanne 2018Applied Machine Learning Days Lausanne 2018
Applied Machine Learning Days Lausanne 2018
Stefano Tempesta
 
Global Dynamics 365 Bootcamp London 2018
Global Dynamics 365 Bootcamp London 2018Global Dynamics 365 Bootcamp London 2018
Global Dynamics 365 Bootcamp London 2018
Stefano Tempesta
 
Blockchain, The Next Frontier of CRM
Blockchain, The Next Frontier of CRMBlockchain, The Next Frontier of CRM
Blockchain, The Next Frontier of CRM
Stefano Tempesta
 
Programming the Microsoft Bot Framework
Programming the Microsoft Bot FrameworkProgramming the Microsoft Bot Framework
Programming the Microsoft Bot Framework
Stefano Tempesta
 
Robotics & AI User Group - Smart City
Robotics & AI User Group - Smart CityRobotics & AI User Group - Smart City
Robotics & AI User Group - Smart City
Stefano Tempesta
 
Robotics & AI User Group - Computer Vision - Azure Kinect
Robotics & AI User Group - Computer Vision - Azure KinectRobotics & AI User Group - Computer Vision - Azure Kinect
Robotics & AI User Group - Computer Vision - Azure Kinect
Stefano Tempesta
 
Virtual eye vision with HoloLens
Virtual eye vision with HoloLensVirtual eye vision with HoloLens
Virtual eye vision with HoloLens
Stefano Tempesta
 
Design Patterns for Distributed Systems in Azure Kubernetes Service
Design Patterns for Distributed Systems in Azure Kubernetes ServiceDesign Patterns for Distributed Systems in Azure Kubernetes Service
Design Patterns for Distributed Systems in Azure Kubernetes Service
Stefano Tempesta
 
Measure your teams sentiment
Measure your teams sentimentMeasure your teams sentiment
Measure your teams sentiment
Stefano Tempesta
 
Electronic signature with blockchain
Electronic signature with blockchainElectronic signature with blockchain
Electronic signature with blockchain
Stefano Tempesta
 
Automate Blockchain Workflows
Automate Blockchain WorkflowsAutomate Blockchain Workflows
Automate Blockchain Workflows
Stefano Tempesta
 
Expert Network - Machine Learning Tech Days
Expert Network - Machine Learning Tech DaysExpert Network - Machine Learning Tech Days
Expert Network - Machine Learning Tech Days
Stefano Tempesta
 
Expert Network - Financial Predictions with Machine Learning
Expert Network - Financial Predictions with Machine LearningExpert Network - Financial Predictions with Machine Learning
Expert Network - Financial Predictions with Machine Learning
Stefano Tempesta
 
Designing and Building Decentralized Blockchain Apps
Designing and Building Decentralized Blockchain AppsDesigning and Building Decentralized Blockchain Apps
Designing and Building Decentralized Blockchain Apps
Stefano Tempesta
 
Smart Unified Service Desk with Machine Learning
Smart Unified Service Desk with Machine LearningSmart Unified Service Desk with Machine Learning
Smart Unified Service Desk with Machine Learning
Stefano Tempesta
 
Introduction to Dynamics 365 for Talent
Introduction to Dynamics 365 for TalentIntroduction to Dynamics 365 for Talent
Introduction to Dynamics 365 for Talent
Stefano Tempesta
 
Dynamics 365 Saturday Dubai 2018
Dynamics 365 Saturday Dubai 2018Dynamics 365 Saturday Dubai 2018
Dynamics 365 Saturday Dubai 2018
Stefano Tempesta
 
Applied Machine Learning Days Lausanne 2018
Applied Machine Learning Days Lausanne 2018Applied Machine Learning Days Lausanne 2018
Applied Machine Learning Days Lausanne 2018
Stefano Tempesta
 
Global Dynamics 365 Bootcamp London 2018
Global Dynamics 365 Bootcamp London 2018Global Dynamics 365 Bootcamp London 2018
Global Dynamics 365 Bootcamp London 2018
Stefano Tempesta
 
Blockchain, The Next Frontier of CRM
Blockchain, The Next Frontier of CRMBlockchain, The Next Frontier of CRM
Blockchain, The Next Frontier of CRM
Stefano Tempesta
 
Programming the Microsoft Bot Framework
Programming the Microsoft Bot FrameworkProgramming the Microsoft Bot Framework
Programming the Microsoft Bot Framework
Stefano Tempesta
 

Recently uploaded (20)

ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
 
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk TechniciansOffshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
john823664
 
The case for on-premises AI
The case for on-premises AIThe case for on-premises AI
The case for on-premises AI
Principled Technologies
 
Fortinet Certified Associate in Cybersecurity
Fortinet Certified Associate in CybersecurityFortinet Certified Associate in Cybersecurity
Fortinet Certified Associate in Cybersecurity
VICTOR MAESTRE RAMIREZ
 
UiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPath Community Berlin: Studio Tips & Tricks and UiPath InsightsUiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPathCommunity
 
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Aaryan Kansari
 
Co-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using ProvenanceCo-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using Provenance
Paul Groth
 
Supercharge Your AI Development with Local LLMs
Supercharge Your AI Development with Local LLMsSupercharge Your AI Development with Local LLMs
Supercharge Your AI Development with Local LLMs
Francesco Corti
 
Jira Administration Training – Day 1 : Introduction
Jira Administration Training – Day 1 : IntroductionJira Administration Training – Day 1 : Introduction
Jira Administration Training – Day 1 : Introduction
Ravi Teja
 
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Lorenzo Miniero
 
Kubernetes Cloud Native Indonesia Meetup - May 2025
Kubernetes Cloud Native Indonesia Meetup - May 2025Kubernetes Cloud Native Indonesia Meetup - May 2025
Kubernetes Cloud Native Indonesia Meetup - May 2025
Prasta Maha
 
New Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDBNew Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDB
ScyllaDB
 
Grannie’s Journey to Using Healthcare AI Experiences
Grannie’s Journey to Using Healthcare AI ExperiencesGrannie’s Journey to Using Healthcare AI Experiences
Grannie’s Journey to Using Healthcare AI Experiences
Lauren Parr
 
Agentic AI - The New Era of Intelligence
Agentic AI - The New Era of IntelligenceAgentic AI - The New Era of Intelligence
Agentic AI - The New Era of Intelligence
Muzammil Shah
 
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Nikki Chapple
 
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 ADr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr. Jimmy Schwarzkopf
 
TrustArc Webinar: Mastering Privacy Contracting
TrustArc Webinar: Mastering Privacy ContractingTrustArc Webinar: Mastering Privacy Contracting
TrustArc Webinar: Mastering Privacy Contracting
TrustArc
 
Jeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software DeveloperJeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software Developer
Jeremy Millul
 
Cyber Security Legal Framework in Nepal.pptx
Cyber Security Legal Framework in Nepal.pptxCyber Security Legal Framework in Nepal.pptx
Cyber Security Legal Framework in Nepal.pptx
Ghimire B.R.
 
Let’s Get Slack Certified! 🚀- Slack Community
Let’s Get Slack Certified! 🚀- Slack CommunityLet’s Get Slack Certified! 🚀- Slack Community
Let’s Get Slack Certified! 🚀- Slack Community
SanjeetMishra29
 
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
 
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk TechniciansOffshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
john823664
 
Fortinet Certified Associate in Cybersecurity
Fortinet Certified Associate in CybersecurityFortinet Certified Associate in Cybersecurity
Fortinet Certified Associate in Cybersecurity
VICTOR MAESTRE RAMIREZ
 
UiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPath Community Berlin: Studio Tips & Tricks and UiPath InsightsUiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPath Community Berlin: Studio Tips & Tricks and UiPath Insights
UiPathCommunity
 
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Aaryan Kansari
 
Co-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using ProvenanceCo-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using Provenance
Paul Groth
 
Supercharge Your AI Development with Local LLMs
Supercharge Your AI Development with Local LLMsSupercharge Your AI Development with Local LLMs
Supercharge Your AI Development with Local LLMs
Francesco Corti
 
Jira Administration Training – Day 1 : Introduction
Jira Administration Training – Day 1 : IntroductionJira Administration Training – Day 1 : Introduction
Jira Administration Training – Day 1 : Introduction
Ravi Teja
 
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Lorenzo Miniero
 
Kubernetes Cloud Native Indonesia Meetup - May 2025
Kubernetes Cloud Native Indonesia Meetup - May 2025Kubernetes Cloud Native Indonesia Meetup - May 2025
Kubernetes Cloud Native Indonesia Meetup - May 2025
Prasta Maha
 
New Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDBNew Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDB
ScyllaDB
 
Grannie’s Journey to Using Healthcare AI Experiences
Grannie’s Journey to Using Healthcare AI ExperiencesGrannie’s Journey to Using Healthcare AI Experiences
Grannie’s Journey to Using Healthcare AI Experiences
Lauren Parr
 
Agentic AI - The New Era of Intelligence
Agentic AI - The New Era of IntelligenceAgentic AI - The New Era of Intelligence
Agentic AI - The New Era of Intelligence
Muzammil Shah
 
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Protecting Your Sensitive Data with Microsoft Purview - IRMS 2025
Nikki Chapple
 
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 ADr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr. Jimmy Schwarzkopf
 
TrustArc Webinar: Mastering Privacy Contracting
TrustArc Webinar: Mastering Privacy ContractingTrustArc Webinar: Mastering Privacy Contracting
TrustArc Webinar: Mastering Privacy Contracting
TrustArc
 
Jeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software DeveloperJeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software Developer
Jeremy Millul
 
Cyber Security Legal Framework in Nepal.pptx
Cyber Security Legal Framework in Nepal.pptxCyber Security Legal Framework in Nepal.pptx
Cyber Security Legal Framework in Nepal.pptx
Ghimire B.R.
 
Let’s Get Slack Certified! 🚀- Slack Community
Let’s Get Slack Certified! 🚀- Slack CommunityLet’s Get Slack Certified! 🚀- Slack Community
Let’s Get Slack Certified! 🚀- Slack Community
SanjeetMishra29
 

Best Practices to Secure Your Kubernetes Cluster

  • 2. Meet our speaker Stefano Tempesta CTO @ SXiQ @stefanotempesta
  • 3. AKS cluster concepts Access and identity Security concepts for applications and clusters Best practices Authentication and authorization Cluster security
  • 7. Security concepts for applications and clusters Master components security Node security Cluster upgrades Network security Kubernetes Secrets https://github.com/weaveworks/kured https://kubernetes.io/docs/concepts/ configuration/secret/
  • 8. Best practices for Authentication and authorization Authenticate AKS cluster users with Azure Active Directory Control access to resources with role-based access controls (RBAC) Use a managed identity to authenticate themselves with other services Azure Active Directory
  • 9. Best practices for Authentication and authorization Role-based access controls (RBAC) Create a Role with full access Create a RoleBinding for the Azure AD user
  • 10. Best practices for Authentication and authorization Pod identities
  • 11. Best practices for cluster security Secure access to the API server and cluster nodes
  • 12. Best practices for cluster security Secure container access to resources
  • 13. Best practices for cluster security Regularly update to the latest version of Kubernetes Check the versions that are available for your cluster Upgrade your AKS cluster
  • 14. Best practices for cluster security Process Linux node updates and reboots using kured
  • 15. Learning path aka.ms/LearnKubernetes What is Kubernetes aka.ms/k8sLearning Hear from experts aka.ms/AKS/videos Case studies aka.ms/aks/casestudy Azure Kubernetes Service aka.ms/AKS/page Try for free aka.ms/aks/trial Resources
  • 16. Q&A

Editor's Notes

  • #5: https://docs.microsoft.com/en-us/azure/aks/concepts-clusters-workloads
  • #6: https://docs.microsoft.com/en-us/azure/aks/concepts-clusters-workloads
  • #7: https://docs.microsoft.com/en-us/azure/aks/concepts-identity
  • #8: https://docs.microsoft.com/en-us/azure/aks/concepts-security
  • #9: https://docs.microsoft.com/en-us/azure/aks/operator-best-practices-identity
  • #10: https://docs.microsoft.com/en-us/azure/aks/operator-best-practices-identity
  • #11: https://docs.microsoft.com/en-us/azure/aks/operator-best-practices-identity
  • #12: https://docs.microsoft.com/en-us/azure/aks/operator-best-practices-cluster-security
  • #13: https://docs.microsoft.com/en-us/azure/aks/operator-best-practices-cluster-security
  • #14: https://docs.microsoft.com/en-us/azure/aks/operator-best-practices-cluster-security
  • #15: https://docs.microsoft.com/en-us/azure/aks/operator-best-practices-cluster-security