@@ -504,6 +504,9 @@ On most Kubernetes-project-maintained distributions, communication between user
504504to the apiserver, and from apiserver to the kubelets, is protected by SSL/TLS.
505505Secrets are protected when transmitted over these channels.
506506
507+ Secret data on nodes is stored in tmpfs volumes and thus does not come to rest
508+ on the node.
509+
507510There may be secrets for several pods on the same node. However, only the
508511secrets that a pod requests are potentially visible within its containers.
509512Therefore, one Pod does not have access to the secrets of another pod.
@@ -515,12 +518,16 @@ Pod level](#use-case-two-containers).
515518
516519# ## Risks
517520
521+ - In the API server secret data is stored as plaintext in etcd; therefore :
522+ - Administrators should limit access to etcd to admin users
523+ - Secret data in the API server is at rest on the disk that etcd uses; admins may want to wipe/shred disks
524+ used by etcd when no longer in use
518525 - Applications still need to protect the value of secret after reading it from the volume,
519526 such as not accidentally logging it or transmitting it to an untrusted party.
520527 - A user who can create a pod that uses a secret can also see the value of that secret. Even
521528 if apiserver policy does not allow that user to read the secret object, the user could
522529 run a pod which exposes the secret.
523- If multiple replicas of etcd are run, then the secrets will be shared between them.
530+ - If multiple replicas of etcd are run, then the secrets will be shared between them.
524531 By default, etcd does not secure peer-to-peer communication with SSL/TLS, though this can be configured.
525532 - It is not possible currently to control which users of a Kubernetes cluster can
526533 access a secret. Support for this is planned.
0 commit comments