This chapter has focused on Kubernetes security in general. We have provided you with 11 recommendations and best practices for securing your Kubernetes cluster, from using RBAC and integrating an external authentication provider, such as Azure Active Directory, to disabling public access for the Kubernetes API and Dashboard and enabling audit logging. We demonstrated how to make your RBAC management and authentication easier on AKS Engine clusters using Azure Active Directory integration. Next, we discussed how to secure container runtime in Kubernetes and the role of network policies (which are not supported on Windows nodes yet).
And lastly, you learned the differences between the injection of Kubernetes secrets on Linux and Windows machines and saw that, with the current design, accessing secrets on Windows machines is easier and can cause security problems. To mitigate...