Merge pull request #3213 from briandowns/issue-3223

Update K3s security documentation.
This commit is contained in:
Catherine Luse
2021-05-05 10:50:45 -07:00
committed by GitHub
2 changed files with 25 additions and 1 deletions
+3 -1
View File
@@ -3,7 +3,9 @@ title: "Security"
weight: 90
---
This section describes the methodology and means of securing a K3s cluster. It's broken into 2 sections.
This section describes the methodology and means of securing a K3s cluster. It's broken into 2 sections. These guides assume k3s is running with embedded etcd.
The documents below apply to both CIS 1.5 & 1.6.
* [Hardening Guide](./hardening_guide/)
* [CIS Benchmark Self-Assessment Guide](./self_assessment/)
@@ -280,6 +280,28 @@ spec:
name: kube-system
```
With the applied restrictions, DNS will be blocked unless purposely allowed. Below is a network policy that will allow for traffic to exist for DNS.
```yaml
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: default-network-dns-policy
namespace: <NAMESPACE>
spec:
ingress:
- ports:
- port: 53
protocol: TCP
- port: 53
protocol: UDP
podSelector:
matchLabels:
k8s-app: kube-dns
policyTypes:
- Ingress
```
> **Note:** Operators must manage network policies as normal for additional namespaces that are created.
## Known Issues