Ensure that your Azure Kubernetes Service (AKS) cluster credentials are regularly rotated in order to meet security and compliance requirements. This reduces the risk of compromised credentials being used to gain unauthorized access to the cluster and its resources. By default, it is recommended to rotate service principal credentials for associated AKS clusters every 90 days.
Regularly rotating Azure Kubernetes Service (AKS) cluster credentials is essential for security. It helps prevent unauthorized access by reducing the risk associated with credential exposure. Credential rotation also aligns with security best practices and policies, mitigating potential threats from leaked or compromised credentials. Updating credentials protects both the Kubernetes cluster and the underlying Azure infrastructure.
Azure Kubernetes Service (AKS) clusters can only rotate credentials when configured to use a service principal for authentication.
Audit
To determine if your AKS cluster credentials are regularly rotated (i.e. every 90 days), perform the following operations:
Checking the credential information of the service principal associated with the AKS cluster using Microsoft Azure Portal (Azure Console) is not currently supported.Remediation / Resolution
To rotate credentials for your Azure Kubernetes Service (AKS) clusters periodically (i.e. every 90 days), perform the following operations:
Rotating credentials for the service principal associated with the AKS cluster using Microsoft Azure Portal (Azure Console) is not currently supported.References
- Azure Official Documentation
- Security concepts for applications and clusters in Azure Kubernetes Service (AKS)
- Update or rotate the credentials for an Azure Kubernetes Service (AKS) cluster
- Azure PowerShell Documentation
- az account list
- az account set
- az aks list
- az aks show
- az ad app credential list
- az ad app credential reset
- az aks update-credentials