The topic of security deserves special attention—Kubernetes is a huge and complex system where security is not obvious and potential attack vectors are not immediately visible. Thinking about security in Kubernetes is even more important if you consider the powerful operations that this system can perform and how deeply it integrates with the operating system internals. Just to shed some light on how things may go south if you overlook configuration details, take a look at an article on how Tesla got cryptojacked because of a public, unauthenticated endpoint for Kubernetes Dashboard (https://blog.heptio.com/on-securing-the-kubernetes-dashboard-16b09b1b7aca).
In this chapter, we are going to provide you with the general best practices for securing Kubernetes clusters, including the Windows workloads perspective. Windows nodes...