Cloudanix home page
Search...
⌘K
Community
Login
Login
Search...
Navigation
Prefer Using Secrets Files Over Secrets As Environment Variables
Overview
AWS
Azure
GCP
GitHub
On-Demand Scan
Kubernetes
Integrations
Azure Introduction
Authenticating your Azure account
Azure Pricing
Azure Services which determine your cost
Azure Threats
Getting Started with Azure Realtime Events
Azure Misconfigurations
Getting Started with Azure Audit
AppServices Audit
Compute Audit
IAM Audit
Network Audit
Security Center Audit
Sql Audit
Storage Audit
Key Vault Audit
Monitor Audit
IAM Deep Dive
On this page
More Info:
Risk Level
Address
Compliance Standards
Additional Reading:
Prefer Using Secrets Files Over Secrets As Environment Variables
More Info:
Use network policies to isolate traffic in your cluster network.
Risk Level
Low
Address
Security
Compliance Standards
CISAKS
Additional Reading:
https://kubernetes.io/docs/concepts/services-networking/networkpolicies/
Assistant
Responses are generated using AI and may contain mistakes.