Cloudanix home page
Search...
⌘K
Community
Login
Login
Search...
Navigation
Prefer Using Dedicated Aks Service Accounts
Overview
AWS
Azure
GCP
GitHub
On-Demand Scan
Kubernetes
Integrations
Azure Introduction
Authenticating your Azure account
Azure Pricing
Azure Services which determine your cost
Azure Threats
Getting Started with Azure Realtime Events
Azure Misconfigurations
Getting Started with Azure Audit
AppServices Audit
Compute Audit
IAM Audit
Network Audit
Security Center Audit
Sql Audit
Storage Audit
Key Vault Audit
Monitor Audit
IAM Deep Dive
On this page
More Info:
Risk Level
Address
Compliance Standards
Additional Reading:
Prefer Using Dedicated Aks Service Accounts
More Info:
Use Approved Container Registries.
Risk Level
High
Address
Security
Compliance Standards
CISAKS
Additional Reading:
https://docs.microsoft.com/security/benchmark/azure/security-controls-v2-asset-management#am-6-use-only-approved-applications-in-compute-resources
Assistant
Responses are generated using AI and may contain mistakes.