AKS Security
Security
AKS supplies many options to create a secured deployment. There is no one-size-fit-all solution that can be used everywhere, so a certain degree of familiarity with these options is required. We recommend implementing the best practices that were highlighted in the below links and use AKS flexible configuration capabilities to incorporate security processes into the continuous integration pipeline, automating the entire process with security seamlessly “baked in”.
Both Pod Security Policies, Security Concepts and Best practices for cluster security give an overview of AKS concepts and guidelines of security.