Does Microsoft support TLS 1 for Kubernetes ?

Cam Hashi 40 Reputation points
2023-11-24T21:17:50.44+00:00

We're thinking about migrating an on-premises containerized application to Azure using AKS.

Some questions from our security team. What kind of encryption does Azure offer for AKS, currently we're using TLS 1. not sure if that's supported by Azure ?

Azure Kubernetes Service
Azure Kubernetes Service
An Azure service that provides serverless Kubernetes, an integrated continuous integration and continuous delivery experience, and enterprise-grade security and governance.
2,447 questions
0 comments No comments
{count} votes

Accepted answer
  1. Adam Zachary 2,936 Reputation points
    2023-11-24T21:26:28.0133333+00:00

    Hi Cam,

    Microsoft does not support TLS 1.0 for Kubernetes in Azure Kubernetes Service (AKS).

    In the context of Azure services, including AKS, Microsoft recommends using TLS version 1.2 or later for secure communication. Legacy versions like SSL 3.0 and TLS 1.0 are advised to be disabled to maintain security standards.

    As for AKS encryption and what Azure offers:

    Azure offers host-based encryption for Azure Kubernetes Service (AKS). This type of encryption ensures that the data stored on the VM host of AKS agent nodes' VMs is encrypted at rest and remains encrypted as it flows to the Storage service.

    By default, AKS uses server-side encryption with platform-managed keys for operating system (OS) and data disks, and the caches for these disks are also encrypted at rest with platform-managed keys.

    Customers have the option to use their own managed keys for encrypting the cache of OS and data disks.

    Host-based encryption in AKS is distinct from server-side encryption (SSE) used by Azure Storage, as it involves encrypting data on the host of the VM before it flows through Azure Storage​​.

    Also, Azure Kubernetes Service (AKS) does not enable data in-transit encryption by default. According to the Azure security baseline for Azure Kubernetes Service (AKS), while the service supports data in-transit encryption for the data plane, it is not enabled by default. It is the customer's responsibility to enable secure transfer in services where there is a native data in transit encryption feature built in. Customers are advised to enforce HTTPS on any web applications and services and ensure TLS v1.2 or later is used, while disabling legacy versions such as SSL 3.0 and TLS v1.0. For remote management of Virtual Machines, using SSH (for Linux) or RDP/TLS (for Windows) is recommended instead of unencrypted protocols​​.

    Kindly review the following Microsoft Documentation:

    https://learn.microsoft.com/en-us/security/benchmark/azure/baselines/azure-kubernetes-service-aks-security-baseline

    https://learn.microsoft.com/en-us/azure/aks/enable-host-encryption

    Kindly if you find the provided information helpful and it resolves your query, please consider accepting the answer. Your feedback is valuable and helps ensure the quality and relevance of the responses.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.