Skip to content

Commit

Permalink
fixed typos in Kubernetes Cheat Sheet (#1470)
Browse files Browse the repository at this point in the history
  • Loading branch information
OngDevLab authored Aug 8, 2024
1 parent 524ca74 commit 8930b55
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion cheatsheets/Kubernetes_Security_Cheat_Sheet.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ Node components run on every node, maintaining running pods and providing the Ku

Kubernetes can be deployed in different ways: on bare metal, on-premise, and in the public cloud (a custom Kubernetes build on virtual machines OR use a managed service). Since Kubernetes is designed to be highly portable, customers can easily and migrate their workloads and switch between multiple installations.

Because Kubernetes can be designed to fit a large variety of scenarios, this flexibility is a weakness when it comes to securing Kubernetes clusters. The engineers responsible for deploying the Kubernetes platform must to know about all the potential attack vectors and vulnerabilities for their clusters.
Because Kubernetes can be designed to fit a large variety of scenarios, this flexibility is a weakness when it comes to securing Kubernetes clusters. The engineers responsible for deploying the Kubernetes platform must know about all the potential attack vectors and vulnerabilities for their clusters.

To harden the underlying hosts for Kubernetes clusters, we recommend that you install the latest version of the operating systems, harden the operating systems, implement necessary patch management and configuration management systems, implement essential firewall rules and undertake specific datacenter-based security measures.

Expand Down

0 comments on commit 8930b55

Please sign in to comment.