Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include Microsoft, Azure, DotNet, AspNet and Xamarin.
If you believe you have found a security vulnerability in any Microsoft-owned repository that meets Microsoft's definition of a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them to the Microsoft Security Response Center (MSRC) at https://msrc.microsoft.com/create-report.
If you prefer to submit without logging in, send email to [email protected]. If possible, encrypt your message with our PGP key; please download it from the Microsoft Security Response Center PGP Key page.
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at microsoft.com/msrc.
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
- Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
This information will help us triage your report more quickly.
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our Microsoft Bug Bounty Program page for more details about our active programs.
We prefer all communications to be in English.
Microsoft follows the principle of Coordinated Vulnerability Disclosure.
Important
This reference architecture is provided under the MIT License and offered "AS IS" without warranty of any kind. The security guidance in this document is informational only and does not constitute professional security advice. You are solely responsible for evaluating the security of your own deployment, including all configuration, operational practices, and compliance requirements. The project maintainers accept no liability for security incidents arising from the use of this architecture.
This reference architecture includes certain security configurations as a starting point. These configurations are not a substitute for a security assessment tailored to your environment.
| Included Configuration | Description | Your Responsibility |
|---|---|---|
| Private AKS cluster option | Enabled by default via Terraform variable | Evaluate whether private mode meets your network requirements |
| Managed identities | User-assigned identity for AKS | Review identity permissions and scope for your workloads |
| Azure Key Vault integration | Key Vault CSI driver configured | Manage secret lifecycle, rotation, and access policies |
| Kubernetes network policies | Azure CNI with network policy support enabled | Define and maintain policies appropriate for your workloads |
| Workload identity | Federated credential configuration for OSMO | Verify audience restrictions and token scoping for your environment |
| Not Included | Why | Where to Start |
|---|---|---|
| Production hardening | Requirements vary by organization and compliance framework | AKS baseline architecture |
| Compliance certification | Compliance is organization-specific and requires formal assessment | Azure compliance documentation |
| Web Application Firewall | WAF configuration depends on ingress patterns and threat model | Azure WAF documentation |
| DDoS protection | DDoS requirements depend on public exposure and SLA needs | Azure DDoS Protection |
| Penetration testing | Pen testing is an operational responsibility | Azure penetration testing rules |
| Remote Terraform state | State backend choice depends on team size and workflow | Terraform Azure backend |
| Secret rotation automation | Rotation schedules are organization-specific | Key Vault rotation |
| Audit logging configuration | Logging requirements vary by compliance framework | Azure Monitor |
You are responsible for all security decisions in your deployment:
- Conduct a security assessment appropriate for your environment and compliance requirements
- Review and customize all Terraform variables, network configurations, and RBAC assignments
- Implement production hardening controls beyond what this reference architecture includes
- Manage secrets, credentials, and access policies throughout the deployment lifecycle
- Monitor your deployment for security events and respond to incidents
- Keep dependencies and base images updated with security patches
Refer to official Azure security documentation for authoritative, current guidance.
- Security Guide for Deployers - detailed security configuration inventory and deployment checklist
- Azure security documentation - authoritative security guidance for Azure services
- AKS baseline architecture - production-ready AKS security patterns