Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 7d3a3f6

Browse files
committedMay 19, 2021
[AKS] remove reference to pod security policy
1 parent 2dd2044 commit 7d3a3f6

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed
 

‎articles/aks/operator-best-practices-cluster-isolation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Logical separation of clusters usually provides a higher pod density than physic
6868

6969
Currently, Kubernetes environments aren't completely safe for hostile multi-tenant usage. In a multi-tenant environment, multiple tenants are working on a common, shared infrastructure. If all tenants cannot be trusted, you will need extra planning to prevent tenants from impacting the security and service of others.
7070

71-
Additional security features, like *Pod Security Policies* or Kubernetes RBAC for nodes, efficiently block exploits. For true security when running hostile multi-tenant workloads, you should only trust a hypervisor. The security domain for Kubernetes becomes the entire cluster, not an individual node.
71+
Additional security features, like Kubernetes RBAC for nodes, efficiently block exploits. For true security when running hostile multi-tenant workloads, you should only trust a hypervisor. The security domain for Kubernetes becomes the entire cluster, not an individual node.
7272

7373
For these types of hostile multi-tenant workloads, you should use physically isolated clusters.
7474

0 commit comments

Comments
 (0)