Azure Compute Solutions
Florin Angelescu
Azure Cloud Architect


AKS integrates with Azure's security ecosystem to protect:
Strong security practices:


Integrates with Entra ID:
Only authorized individuals can deploy, scale, or modify workloads.


Applications require sensitive information:
Kubernetes stores these as secrets.



AKS clusters run inside Azure Virtual Networks:
Restrict traffic between pods.


Ingress controllers:
Network policies:

Container images:
Azure Container Registry:

Policies

Update base images and apply patches:
Validating images:

Azure Defender for Kubernetes
Detecting suspicious activity:
Compliance tools:

Securing applications in AKS:
Azure Compute Solutions