Secure your Kubernetes Cluster running on Google cloud (features : out of the box)
2 min readJul 10, 2018
Kubernetes engine has 2 parts -> Master Nodes and Worker Nodes
Google cloud provides out of the Box security features:
**Master Nodes and API: Security features
- Master API network access : only from whitelisted IP range (Firewall rules)
2. Master API : TLS encryption
3. Master API access by IAM authentication: Roles and permissions
**Worker Nodes and API: Security features
- VM’s and Pods are assigned Private IP (RFC 1918 IP addresses)
- Worker nodes cluster runs inside a Private VPC
- Set Firewalls rules to Worker nodes
- Attach Network policy to any Kubernetes Pod
- Kube network policies allow you to restrict pod-to-pod traffic (east-west)
- Calico Network Plugin, created with Tigera
- Layer 7 protection to Kube Ingress (HTTPS server)
- Secure Traffic between Clients and Google Ingress (Load balancer) using TLS certificates
- Attach a Private key and Certificate to Ingress using a Kube Secret
**Securely connect to Google’s managed services, without exposing your traffic to the public internet. Traffic from Pods to Google Services, is passing through Google Private network.