Ensure that your Azure Kubernetes Service (AKS) clusters are configured with encryption at rest for Kubernetes secrets in etcd using a private Azure Key Vault.
excellence
optimisation
Enabling encryption at rest for Kubernetes secrets in etcd using a private Key Vault adds a layer of security, protecting sensitive data, meeting compliance requirements, and preventing unauthorized access. It ensures that even if an attacker gains access to storage, encrypted secrets remain protected and inaccessible without the encryption keys. Enabling encryption with a private Key Vault in AKS automatically creates a private endpoint and private link in the node resource group. It establishes a private endpoint connection between the Key Vault and the AKS cluster.
Audit
To determine if your Azure Kubernetes clusters are using a private Key Vault for secret data encryption, perform the following operations:
Checking Azure Kubernetes Service (AKS) clusters for encryption with private Key Vaults using Azure Console (Azure Portal) is not currently supported.Remediation / Resolution
To configure Azure Kubernetes Service (AKS) clusters to use a private Key Vault for secret data encryption, perform the following operations:
Configuring Azure Kubernetes clusters to use a private Key Vault for secret data encryption using Azure Console (Azure Portal) is not currently supported.References
- Azure Official Documentation
- Add Key Management Service (KMS) etcd encryption to an Azure Kubernetes Service (AKS) cluster
- Add secret management
- Azure PowerShell Documentation
- az aks list
- az aks show
- az keyvault create
- az identity create
- az keyvault set-policy
- az role assignment create
- az keyvault key create
- az aks update