Skip to content

Commit 3b8c927

Browse files
committed
Address comments
Signed-off-by: Rita Zhang <rita.z.zhang@gmail.com>
1 parent 926db12 commit 3b8c927

File tree

5 files changed

+15
-31
lines changed

5 files changed

+15
-31
lines changed

content/en/docs/concepts/configuration/secret.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -666,16 +666,11 @@ Therefore, one Pod does not have access to the Secrets of another Pod.
666666

667667
### Configure least-privilege access to Secrets
668668

669-
To enhance the security measures around Secrets, Kubernetes provides a mechanism: you can
670-
annotate a ServiceAccount as `kubernetes.io/enforce-mountable-secrets: "true"`.
671-
672-
For more information, you can refer to the [documentation about this annotation](/docs/concepts/security/service-accounts/#enforce-mountable-secrets).
669+
To enhance the security measures around Secrets, use separate namespaces to isolate access to mounted secrets.
673670

674671
{{< warning >}}
675672
Any containers that run with `privileged: true` on a node can access all
676673
Secrets used on that node.
677-
678-
`kubernetes.io/enforce-mountable-secrets` is deprecated in v1.32+. Use separate namespaces to isolate access to mounted secrets.
679674
{{< /warning >}}
680675

681676
## {{% heading "whatsnext" %}}

content/en/docs/concepts/security/secrets-good-practices.md

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -62,15 +62,8 @@ recommendations include:
6262
* Implement audit rules that alert on specific events, such as concurrent
6363
reading of multiple Secrets by a single user
6464

65-
#### Additional ServiceAccount annotations for Secret management
66-
67-
You can also use the `kubernetes.io/enforce-mountable-secrets` annotation on
68-
a ServiceAccount to enforce specific rules on how Secrets are used in a Pod.
69-
For more details, see the [documentation on this annotation](/docs/reference/labels-annotations-taints/#enforce-mountable-secrets).
70-
71-
{{< warning >}}
72-
`kubernetes.io/enforce-mountable-secrets` is deprecated in v1.32+. Use separate namespaces to isolate access to mounted secrets.
73-
{{< /warning >}}
65+
#### Restrict Access for Secrets
66+
Use separate namespaces to isolate access to mounted secrets.
7467

7568
### Improve etcd management policies
7669

content/en/docs/concepts/security/service-accounts.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -197,11 +197,13 @@ or using a custom mechanism such as an [authentication webhook](/docs/reference/
197197
You can also use TokenRequest to obtain short-lived tokens for your external application.
198198
{{< /note >}}
199199

200-
### Restricting access to Secrets {#enforce-mountable-secrets}
200+
### Restricting access to Secrets (deprecated) {#enforce-mountable-secrets}
201201

202-
{{< warning >}}
203-
`kubernetes.io/enforce-mountable-secrets` is deprecated in v1.32+. Use separate namespaces to isolate access to mounted secrets.
204-
{{< /warning >}}
202+
{{< feature-state for_k8s_version="v1.32" state="deprecated" >}}
203+
204+
{{< note >}}
205+
`kubernetes.io/enforce-mountable-secrets` is deprecated since Kubernetes v1.32. Use separate namespaces to isolate access to mounted secrets.
206+
{{< /note >}}
205207

206208
Kubernetes provides an annotation called `kubernetes.io/enforce-mountable-secrets`
207209
that you can add to your ServiceAccounts. When this annotation is applied,

content/en/docs/reference/access-authn-authz/admission-controllers.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -785,13 +785,7 @@ The Kubernetes project strongly recommends enabling this admission controller.
785785
You should enable this admission controller if you intend to make any use of Kubernetes
786786
`ServiceAccount` objects.
787787

788-
Regarding the annotation `kubernetes.io/enforce-mountable-secrets`: While the annotation's name suggests it only concerns the mounting of Secrets,
789-
its enforcement also extends to other ways Secrets are used in the context of a Pod.
790-
Therefore, it is crucial to ensure that all the referenced secrets are correctly specified in the ServiceAccount.
791-
792-
{{< warning >}}
793-
`kubernetes.io/enforce-mountable-secrets` is deprecated in v1.32+. Use separate namespaces to isolate access to mounted secrets.
794-
{{< /warning >}}
788+
To enhance the security measures around Secrets, use separate namespaces to isolate access to mounted secrets.
795789

796790
### StorageObjectInUseProtection
797791

content/en/docs/reference/labels-annotations-taints/_index.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -804,18 +804,18 @@ Used on: All Objects
804804

805805
This annotation is used for describing specific behaviour of given object.
806806

807-
### kubernetes.io/enforce-mountable-secrets {#enforce-mountable-secrets}
808-
809-
{{< warning >}}
810-
`kubernetes.io/enforce-mountable-secrets` is deprecated in v1.32+. Use separate namespaces to isolate access to mounted secrets.
811-
{{< /warning >}}
807+
### kubernetes.io/enforce-mountable-secrets (deprecated) {#enforce-mountable-secrets}
812808

813809
Type: Annotation
814810

815811
Example: `kubernetes.io/enforce-mountable-secrets: "true"`
816812

817813
Used on: ServiceAccount
818814

815+
{{< note >}}
816+
`kubernetes.io/enforce-mountable-secrets` is deprecated since Kubernetes v1.32. Use separate namespaces to isolate access to mounted secrets.
817+
{{< /note >}}
818+
819819
The value for this annotation must be **true** to take effect.
820820
When you set this annotation to "true", Kubernetes enforces the following rules for
821821
Pods running as this ServiceAccount:

0 commit comments

Comments
 (0)