Skip to content

Commit 19a3dc0

Browse files
committed
Add links between securing cluster and security checklist
1 parent f635cee commit 19a3dc0

File tree

2 files changed

+7
-2
lines changed

2 files changed

+7
-2
lines changed

content/en/docs/concepts/security/security-checklist.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -423,6 +423,8 @@ alpha state but could be considered for certain use cases:
423423

424424
- [RBAC Good Practices](/docs/concepts/security/rbac-good-practices/) for
425425
further information on authorization.
426+
- [Securing a Cluster](/docs/tasks/administer-cluster/securing-a-cluster/) for
427+
information on protecting a cluster from accidental or malicious access.
426428
- [Cluster Multi-tenancy guide](/docs/concepts/security/multi-tenancy/) for
427429
configuration options recommendations and best practices on multi-tenancy.
428430
- [Blog post "A Closer Look at NSA/CISA Kubernetes Hardening Guidance"](/blog/2021/10/05/nsa-cisa-kubernetes-hardening-guidance/#building-secure-container-images)

content/en/docs/tasks/administer-cluster/securing-a-cluster.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ The shorter the lifetime of a secret or credential the harder it is for an attac
224224
use of that credential. Set short lifetimes on certificates and automate their rotation. Use
225225
an authentication provider that can control how long issued tokens are available and use short
226226
lifetimes where possible. If you use service-account tokens in external integrations, plan to
227-
rotate those tokens frequently. For example, once the bootstrap phase is complete, a bootstrap
227+
rotate those tokens frequently. For example, once the bootstrap phase is complete, a bootstrap
228228
token used for setting up nodes should be revoked or its authorization removed.
229229

230230
### Review third party integrations before enabling them
@@ -255,7 +255,7 @@ and may grant an attacker significant visibility into the state of your cluster.
255255
your backups using a well reviewed backup and encryption solution, and consider using full disk
256256
encryption where possible.
257257

258-
Kubernetes supports optional [encryption at rest](/docs/tasks/administer-cluster/encrypt-data/) for information in the Kubernetes API.
258+
Kubernetes supports optional [encryption at rest](/docs/tasks/administer-cluster/encrypt-data/) for information in the Kubernetes API.
259259
This lets you ensure that when Kubernetes stores data for objects (for example, `Secret` or
260260
`ConfigMap` objects), the API server writes an encrypted representation of the object.
261261
That encryption means that even someone who has access to etcd backup data is unable
@@ -272,3 +272,6 @@ group for emails about security announcements. See the
272272
page for more on how to report vulnerabilities.
273273

274274

275+
## What's next
276+
277+
- [Security Checklist](/docs/concepts/security/security-checklist/) for additional information on Kubernetes security guidance.

0 commit comments

Comments
 (0)