Built-in policies for AKS

Completed

Now that you created an Azure Kubernetes Service (AKS) cluster with the policy add-on enabled, you'll need to find the policy definitions that you want to assign to your environment. In this section, you'll learn how to discover policies and the next section will walk you through an example on how to assign those policies.

Types of Azure Policies for AKS

There are two types of Azure Policies that can be applied to AKS: cluster policies or workload policies.

Cluster policies cover the cluster itself, not the workload running on the cluster. You would configure these policies to enforce cluster configuration. Examples of these policies include Authorized IP ranges should be defined on Kubernetes Services and Role-Based Access Control (RBAC) should be used on Kubernetes Services.

Workload policies cover the applications running in your cluster. Workload policies are used to enforce configuration inside the Kubernetes cluster. These policies rely on the Azure policy for Kubernetes add-on to function correctly. Examples of these policies include Kubernetes cluster containers should only use allowed images and Kubernetes cluster pods should only use allowed volume types.

It is useful to think about the Azure policies for Kubernetes this way. They allow you to distinguish between policies impacting the cluster versus the application running on the cluster. It is worth noting that these different policy types are not distinguished during the policy discovery.

Discovering built-in Azure policies for Kubernetes

There are two ways to discover built-in Azure policies for Kubernetes:

You can assign one or multiple of these policy definitions to your management groups, subscriptions, or resource groups. In the next unit, you will follow an exercise that will walk you through how to do that.

Policy initiative: Kubernetes cluster pod security baseline standards for Linux-based workloads

Azure Policy for Kubernetes also has multiple policy initiatives. A policy initiative is a collection of policy definitions. Two of the initiatives for Kubernetes are:

  • Kubernetes cluster pod security baseline standards for Linux-based workloads
  • Kubernetes cluster pod security restricted standards for Linux-based workloads

The baseline version includes five policy definitions focused on providing a security baseline for your Kubernetes workloads. The restricted version includes a total of eight policy definitions for more security restricted environments.

You can assign these initiatives to your Azure Management groups, Subscriptions, or Resource Groups with an AKS cluster to enforce a consistent security baseline.