Overview
K8SaaS security encompasses multiple layers: TLS encryption for all cluster API communication, Kubernetes RBAC within clusters, network-level restrictions via security groups, and hardened node images. This page covers the key security controls and how to verify they are correctly applied across your K8SaaS deployment.TLS Configuration
All K8SaaS cluster API communication is TLS-encrypted. Each cluster has a dedicated CA generated at provisioning time.Verify TLS on the API server
Verify TLS on the API server
Check API server TLS certificate
Key Management integration
Key Management integration
Enable Xloud Key Management to store CA private keys outside the K8SaaS database.
This prevents CA private keys from being accessible to anyone with database
read access.
- XDeploy
- CLI
Configure certificate manager
Navigate to XDeploy → Advanced Configuration, select magnum in the
Service Tree, then open or create Click Save Current File.
kubernetes.conf. Add the following:kubernetes.conf
Kubernetes RBAC
Kubernetes RBAC is enabled by default on all K8SaaS clusters. The--authorization-mode
flag is set to Node,RBAC in the Kubernetes API server configuration.
Enforce least-privilege service accounts
Enforce least-privilege service accounts
Do not grant the
cluster-admin role to application service accounts. Use
namespace-scoped roles and bindings:Namespace-scoped role example
Check for overly broad cluster-admin bindings
Audit RBAC bindings
Audit RBAC bindings
Periodically audit cluster role bindings to identify unauthorized privilege escalation:
List all cluster-level role bindings
Find service accounts with admin privileges
Node Security Groups
Each K8SaaS cluster creates dedicated security groups for master and worker nodes. Review and restrict these groups to permit only required traffic.List cluster security groups
Required Ports
| Port | Protocol | Direction | Purpose |
|---|---|---|---|
| 6443 | TCP | Inbound to masters | Kubernetes API server (kubectl, kubelets) |
| 2379-2380 | TCP | Master to master | etcd peer and client communication |
| 10250 | TCP | Master to workers | kubelet API |
| 10255 | TCP | Any (optional) | kubelet read-only API (disable if not needed) |
| VXLAN / BGP | UDP/TCP | Node to node | CNI overlay (Flannel) or BGP peering (Calico) |
Restrict master API port to management CIDR only
Remove any overly permissive rule
Node Image Hardening
Use CIS-benchmarked or hardened node images for production cluster templates.Use Hardened Images
Use images with CIS Level 1 benchmark applied. Fedora CoreOS provides a minimal,
immutable OS — a good baseline for Kubernetes node hardening.
Rotate Images on Security Updates
When node OS security updates are released, create a new cluster template with
the updated image and upgrade existing clusters to replace all nodes.
Validation Checklist
Next Steps
Certificates
Manage and rotate cluster CA certificates.
Monitoring
Monitor cluster health and audit security events.
Network Drivers
Configure Calico for NetworkPolicy enforcement in production clusters.
Key Manager
Configure Xloud Key Management for cluster CA storage.