Cluster security

If you go back to the creation of a cluster, you will notice that we always had to create or import a certificate—without it, there was no way to proceed. You have to remember that it is your responsibility to secure your environment and prevent unauthorized access. As the documentation states, it is impossible to create an insecure cluster—this is, of course, true. However, if you expose your endpoint (especially in production workloads) publicly, there is always the possibility that somebody will figure it out and start abusing it.

Get Hands-On Azure for Developers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.