CCE Security Guide
Node Security Hardening
Cloud Container Engine (CCE) cluster nodes are created from the public images published by Image Management Service (IMS) in the public cloud. CCE performs security hardening on the CCE software installed on nodes. The OS configurations are the same as those of public images by default. You need to perform security hardening based on your own security requirements.
Container Security Suggestions
CCE provides you with an exclusive cluster. You are not advised to share a cluster with multiple tenants. If a cluster must be shared by multiple tenants, perform security hardening by following the suggestions in the following table.
Category |
Suggestion |
---|---|
Least privilege |
|
By default, the token of ServiceAccount default is not used.
|
|
Network isolation |
Network isolation between containers in a cluster Use network policies to implement access control. Network isolation between containers and hosts outside the cluster Use security groups in a VPC to implement access control. Network isolation between containers and the cluster control plane CCE clusters are private and workloads would access the cluster API server. Therefore, CCE does not restrict the network communication between containers and the Kubernetes control plane. You can harden the network security by limiting the pod QoS. |
Mounting of sensitive host directories |
|
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot