Ensure that your Azure Kubernetes Service (AKS) clusters are deployed as private clusters in order to enhance your Kubernetes workload's security and isolation. Private link-based AKS clusters are Kubernetes clusters where the API server is accessed through a private endpoint within your Virtual Network (VNet), rather than a public IP. This ensures that communication between the API server and the node pools occurs over a secure, private connection, without exposing the cluster to the Internet.
Using private link-based AKS clusters in Azure cloud enhances security by ensuring that the Kubernetes API server is accessible only within your private network, preventing exposure to the public Internet. This reduces the attack surface, improves data privacy, and allows for stricter control over network traffic, aligning with security best practices for sensitive workloads.
Audit
To determine if your Azure Kubernetes Service (AKS) clusters are public or private, perform the following operations:
Remediation / Resolution
To ensure that your Azure Kubernetes Service (AKS) clusters are private, you have to re-create your clusters. To relaunch your AKS clusters with the required networking configuration, perform the following operations:
References
- Azure Official Documentation
- Create a private Azure Kubernetes Service (AKS) cluster
- Access a private Azure Kubernetes Service (AKS) cluster using the command invoke or Run command feature
- Azure PowerShell Documentation
- az account list
- az account set
- az aks list
- az aks show
- az aks create