From the course: Kubernetes Network and Cluster Hardening by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Network policies - Kubernetes Tutorial
From the course: Kubernetes Network and Cluster Hardening by Pearson
Network policies
Network policy is a core component of protecting any systems, and Kubernetes is no difference. When we think about clusters and we think about all the endpoints that are associated with them, there are a lot of different ports that are available. These various ports will serve different functions, but all of this represents an attack plane associated with what an attacker may try to gain access to. One of the key things that we're going to see are obviously the API server. That is one of the first places they want to go because that's the quickest way to be able to get into the system. Now typically it is going to be protected. If you've deployed it, Kubernetes with a secure fashion, you're going to have various certificates, you're going to have authorization set up and things like that. But port 6443 is where the default configuration is for the API server and one of the first places that individuals will look if they're trying to break into a system. is you're going to have your…