Ensure that your ACK cluster's API server is not publicly accessible in order to avoid exposing private data and minimizing security risks. The level of access to your Kubernetes API server depends on your application use cases, however, for most use cases, the Kubernetes API Server should be accessible only from within your Virtual Private Cloud (VPC).
If the Kubernetes API server is publicly accessible, any machine on the Internet can potentially connect to your ACK cluster using its public endpoint. This exposes your cluster to a higher risk of malicious activities and attacks. Restricting public access to the Kubernetes API server managed by the ACK cluster is a security best practice that helps protect your cluster from unauthorized access and potential security threats.
Audit
To determine if your ACK cluster's API server is publicly accessible, perform the following operations:
Remediation / Resolution
To disable public network access to your ACK cluster's API server, perform the following operations:
References
- Alibaba Cloud Documentation
- Overview of VPCs and vSwitches
- Control public access to the API server of a cluster
- Alibaba Cloud CLI Documentation
- View all clusters
- ModifyCluster