%3CLINGO-SUB%20id%3D%22lingo-sub-1705759%22%20slang%3D%22en-US%22%3ESecurity%20capabilities%20in%20Azure%20Kubernetes%20Service%20on%20Azure%20Stack%20HCI%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1705759%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Kubernetes%20Service%20on%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fproducts%2Fazure-stack%2Fhci%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Stack%20HCI%3C%2FA%3E%20(AKS-HCI)%20is%20an%20on-premises%20implementation%20of%20the%20popular%20Azure%20Kubernetes%20Service%20(AKS)%20orchestrator%2C%20which%20automates%20running%20containerized%20applications%20at%20scale.%20AKS%20on%20Azure%20Stack%20HCI%20enables%20developers%20and%20admins%20to%20deploy%20and%20manage%20Linux%20and%20Windows%20containerized%20apps%20on%20Azure%20Stack%20HCI.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20AKS-HCI%2C%20enterprises%20can%20take%20advantage%20of%20consistent%20AKS%20experience%20across%20cloud%20and%20on-premises%20environments%2C%20extend%20to%20Azure%20with%20hybrid%20capabilities%2C%20run%20apps%20with%20confidence%20through%20built-in%20security%2C%20and%20use%20familiar%20tools%20to%20modernize%20Windows%20apps.%20For%20a%20more%20detailed%20overview%20of%20AKS-HCI%20capabilities%2C%20refer%20to%20this%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-stack-blog%2Faks-on-azurestack-hci-now-in-public-preview%2Fba-p%2F1707641%22%20target%3D%22_blank%22%3Eblog%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOne%20of%20the%20core%20strengths%20of%20AKS-HCI%20is%20using%20security-first%20approach.%20At%20Microsoft%2C%20we%20believe%20that%20leading%20with%20strong%20security%20posture%20is%20table%20stakes%20for%20an%20enterprise-grade%20offering.%20Our%20security%20roadmap%20is%20comprehensive%2C%20starting%20with%20a%20mindset%20of%20placing%20strong%20protection%20guardrails%20and%20bolstering%20that%20with%20industry-hardened%20threat%20detection%2C%20and%20remediation%20and%20recovery.%20The%20protection-related%20hardening%20is%20built%20into%20AKS-HCI.%20To%20bring%20threat%20detection%20and%20remediation%2C%20and%20we%20integrate%20with%20security%20management%20systems%20such%20as%20Azure%20Security%20Center.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22rahulverma_0-1600903582089.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F221656i8441DF083C75A57D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22rahulverma_0-1600903582089.png%22%20alt%3D%22rahulverma_0-1600903582089.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EFigure%201.%20Securing%20AKS-HCI%20Deployment%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20this%20blog%2C%20we%20will%20describe%20the%20security%20capabilities%20in%20AKS-HCI.%20These%20security%20features%20are%20not%20available%20in%20the%20current%20public%20preview%20version%2C%20but%20these%20and%20more%20will%20be%20released%20in%20the%20lead-up%20to%20general%20availability.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1244535603%22%20id%3D%22toc-hId--1244535609%22%3ESecure%20image%20baseline%20and%20container%20protection%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20provides%20a%20secure%20baseline%20for%20Windows%20and%20Linux%20container%20host%20images%20and%20services%20the%20updates%20of%20those%20images%20to%20maintain%20consistency%20and%20standards.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22rahulverma_1-1600903582114.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F221657i0273EFA5428DD0AE%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22rahulverma_1-1600903582114.png%22%20alt%3D%22rahulverma_1-1600903582114.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EFigure%202.%20AKS-HCI%20implemented%20with%20hypervisor%20isolation%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAKS-HCI%20is%20designed%20such%20that%20every%20layer%20is%20secure.%20The%20container%20host%20is%20deployed%20as%20a%20virtual%20machine.%20Each%20tenant%20cluster%20runs%20on%20its%20dedicated%20set%20of%20container%20hosts%20and%20uses%20the%20same%20strong%20Hyper-V-based%20isolation%20used%20in%20Azure%20which%20provides%20the%20strong%20kernel%20isolation%20among%20the%20container%20hosts.%20%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20addition%2C%20AKS-HCI%20has%20multiple%20layers%20of%20protection%20built%20in.%20The%20first%20cluster%20to%20be%20bootstrapped%20is%20the%20management%20cluster%2C%20which%20is%20then%20used%20to%20bootstrap%20other%20tenant%20clusters.%20The%20container%20pods%20are%20run%20within%20Hyper-V%20virtual%20machines%2C%20enforcing%20strong%20isolation%20guarantees%20wherein%20the%20impact%20of%20a%20compromised%20container%20or%20pod%20is%20contained%20within%20the%20Hyper-V%20VM%20itself.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1242977230%22%20id%3D%22toc-hId-1242977224%22%3EIdentity%20and%20access%20management%20(IAM)%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAKS-HCI%20integrates%20with%20Active%20Directory%20(AD)%2C%20providing%20strong%20identity%20and%20facilitating%20seamless%20single%20sign-on%20(SSO)%20to%20manage%20the%20AKS-HCI%20environment%20and%20deploy%20the%20container%20workloads.%20Additionally%2C%20there%20is%20provision%20for%20Windows%20containerized%20application%20workloads%20to%20be%20bootstrapped%20with%20group%20Managed%20Service%20Account%20(gMSA)%20identity.%20gMSA%20is%20an%20AD-managed%20service%20account%20for%20which%20the%20passwords%20are%20automatically%20rotated.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--564477233%22%20id%3D%22toc-hId--564477239%22%3ESecure%20communication%20and%20secrets%20Management%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECommunication%20between%20the%20control%20plane%20components%20is%20protected%20by%20Transport%20Layer%20Security%20(TLS).%20AKS-HCI%20comes%20with%20zero-touch%2C%20out-of-the-box%20provisioning%2C%20and%20management%20of%20certificates%20for%20the%20infrastructure%20and%20Kubernetes%20built-in%20components.%20Additionally%2C%20the%20Kubernetes%20secrets%20are%20encrypted%20at%20rest%20using%20strong%20Advanced%20Encryption%20Standard%20(AES)%2C%20with%20the%20ability%20to%20rotate%20the%20key%20encryption%20keys%20(KEK).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1923035600%22%20id%3D%22toc-hId-1923035594%22%3EIntegration%20with%20Azure%20security%20assets%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAKS-HCI%20is%20integrated%20into%20the%20Microsoft%20security%20ecosystem%2C%20which%20allows%20extending%20Azure%20security%20constructs%20such%20as%20Azure%20Container%20Registry%20and%20Azure%20policies.%20In%20the%20future%2C%20integration%20with%20Azure%20assets%20like%20Azure%20Security%20Center%20will%20provide%20customers%20the%20ability%20to%20monitor%20for%20threats%20and%20offer%20pre-%20and%20post-runtime%20security%20assessments%20for%20both%20the%20infrastructure%20fabric%20and%20the%20Kubernetes%20cluster.%20This%20helps%20in%20monitoring%20for%20threats%20and%20keeping%20a%20strong%20security%20posture.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-115581137%22%20id%3D%22toc-hId-115581131%22%3EJoin%20us%20in%20this%20journey%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESecurity%20is%20a%20journey%2C%20not%20a%20destination.%20These%20are%20just%20some%20of%20the%20security%20features%20that%20we%20are%20working%20on%20and%20making%20generally%20available%20(GA)%20soon.%20AKS-HCI%20is%20going%20to%20be%20continually%20updated%20like%20a%20service.%20We%20will%20add%20more%20security%20features%20and%20continue%20to%20further%20harden%20the%20platform.%20Join%20us%20in%20this%20journey%3A%20we%20would%20love%20to%20hear%20feedback%2C%20experience%2C%20and%20insights%20on%20security.%20Be%20part%20of%20discussions%20in%20our%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FAzure%2Faks-hci%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EGithub%20repository%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1705759%22%20slang%3D%22en-US%22%3E%3CP%3ELearn%20about%20the%20security%20capabilities%20of%20Azure%20Kubernetes%20Service%20on%20Azure%20Stack%20HCI%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22rahulverma_0-1600903582089.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F221656i8441DF083C75A57D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22rahulverma_0-1600903582089.png%22%20alt%3D%22rahulverma_0-1600903582089.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

Azure Kubernetes Service on Azure Stack HCI (AKS-HCI) is an on-premises implementation of the popular Azure Kubernetes Service (AKS) orchestrator, which automates running containerized applications at scale. AKS on Azure Stack HCI enables developers and admins to deploy and manage Linux and Windows containerized apps on Azure Stack HCI.

 

With AKS-HCI, enterprises can take advantage of consistent AKS experience across cloud and on-premises environments, extend to Azure with hybrid capabilities, run apps with confidence through built-in security, and use familiar tools to modernize Windows apps. For a more detailed overview of AKS-HCI capabilities, refer to this blog.

 

One of the core strengths of AKS-HCI is using security-first approach. At Microsoft, we believe that leading with strong security posture is table stakes for an enterprise-grade offering. Our security roadmap is comprehensive, starting with a mindset of placing strong protection guardrails and bolstering that with industry-hardened threat detection, and remediation and recovery. The protection-related hardening is built into AKS-HCI. To bring threat detection and remediation, and we integrate with security management systems such as Azure Security Center.

 

rahulverma_0-1600903582089.png

Figure 1. Securing AKS-HCI Deployment

 

In this blog, we will describe the security capabilities in AKS-HCI. These security features are not available in the current public preview version, but these and more will be released in the lead-up to general availability.

 

Secure image baseline and container protection

 

Microsoft provides a secure baseline for Windows and Linux container host images and services the updates of those images to maintain consistency and standards.

 

rahulverma_1-1600903582114.png

 

Figure 2. AKS-HCI implemented with hypervisor isolation

 

AKS-HCI is designed such that every layer is secure. The container host is deployed as a virtual machine. Each tenant cluster runs on its dedicated set of container hosts and uses the same strong Hyper-V-based isolation used in Azure which provides the strong kernel isolation among the container hosts.  

 

In addition, AKS-HCI has multiple layers of protection built in. The first cluster to be bootstrapped is the management cluster, which is then used to bootstrap other tenant clusters. The container pods are run within Hyper-V virtual machines, enforcing strong isolation guarantees wherein the impact of a compromised container or pod is contained within the Hyper-V VM itself.

 

Identity and access management (IAM)

 

AKS-HCI integrates with Active Directory (AD), providing strong identity and facilitating seamless single sign-on (SSO) to manage the AKS-HCI environment and deploy the container workloads. Additionally, there is provision for Windows containerized application workloads to be bootstrapped with group Managed Service Account (gMSA) identity. gMSA is an AD-managed service account for which the passwords are automatically rotated.

 

Secure communication and secrets Management

 

Communication between the control plane components is protected by Transport Layer Security (TLS). AKS-HCI comes with zero-touch, out-of-the-box provisioning, and management of certificates for the infrastructure and Kubernetes built-in components. Additionally, the Kubernetes secrets are encrypted at rest using strong Advanced Encryption Standard (AES), with the ability to rotate the key encryption keys (KEK).

 

Integration with Azure security assets

 

AKS-HCI is integrated into the Microsoft security ecosystem, which allows extending Azure security constructs such as Azure Container Registry and Azure policies. In the future, integration with Azure assets like Azure Security Center will provide customers the ability to monitor for threats and offer pre- and post-runtime security assessments for both the infrastructure fabric and the Kubernetes cluster. This helps in monitoring for threats and keeping a strong security posture.

 

Join us in this journey

 

Security is a journey, not a destination. These are just some of the security features that we are working on and making generally available (GA) soon. AKS-HCI is going to be continually updated like a service. We will add more security features and continue to further harden the platform. Join us in this journey: we would love to hear feedback, experience, and insights on security. Be part of discussions in our Github repository.