Introduction to Azure Defender for Kubernetes
Azure Defender for Kubernetes is the Azure Defender plan providing protections for your Kubernetes clusters wherever they're running.
We can defend clusters in:
Azure Kubernetes Service (AKS) - Microsoft's managed service for developing, deploying, and managing containerized applications
On-premises and multi-cloud environments - Using an extension for Arc enabled Kubernetes
Azure Security Center and AKS form a cloud-native Kubernetes security offering with environment hardening, workload protection, and run-time protection as outlined in Container security in Security Center.
Host-level threat detection for your Linux AKS nodes is available if you enable Azure Defender for servers and its Log Analytics agent. However, if your cluster is deployed on an Azure Kubernetes Service virtual machine scale set (VMSS), the Log Analytics agent is not currently supported.
|Release state:||General availability (GA)|
|Pricing:||Azure Defender for Kubernetes is billed as shown on Security Center pricing|
|Required roles and permissions:||Security admin can dismiss alerts.
Security reader can view findings.
National/Sovereign (Azure Government, Azure China 21Vianet)
What are the benefits of Azure Defender for Kubernetes?
Azure Defender for Kubernetes provides cluster-level threat protection by monitoring your clusters' logs.
Examples of security events that Azure Defender for Kubernetes monitors include exposed Kubernetes dashboards, creation of high privileged roles, and the creation of sensitive mounts. For a full list of the cluster level alerts, see the reference table of alerts.
You can simulate container alerts by following the instructions in this blog post.
Also, our global team of security researchers constantly monitor the threat landscape. They add container-specific alerts and vulnerabilities as they're discovered.
Azure Defender generates security alerts for actions and deployments that occur after you've enabled the Defender for Kubernetes plan on your subscription.
FAQ - Azure Defender for Kubernetes
- Can I still get cluster protections without the Log Analytics agent?
- Does AKS allow me to install custom VM extensions on my AKS nodes?
- If my cluster is already running an Azure Monitor for containers agent, do I need the Log Analytics agent too?
- Does Azure Defender for Kubernetes support AKS with VMSS nodes?
Can I still get cluster protections without the Log Analytics agent?
Azure Defender for Kubernetes plan provides protections at the cluster level. If you also deploy the Log Analytics agent of Azure Defender for servers, you'll get the threat protection for your nodes that's provided with that plan. Learn more in Introduction to Azure Defender for servers.
We recommend deploying both, for the most complete protection possible.
If you choose not to install the agent on your hosts, you'll only receive a subset of the threat protection benefits and security alerts. You'll still receive alerts related to network analysis and communications with malicious servers.
Does AKS allow me to install custom VM extensions on my AKS nodes?
For Azure Defender to monitor your AKS nodes, they must be running the Log Analytics agent.
AKS is a managed service and since the Log analytics agent is a Microsoft-managed extension, it is also supported on AKS clusters.
If my cluster is already running an Azure Monitor for containers agent, do I need the Log Analytics agent too?
For Azure Defender to monitor your nodes, they must be running the Log Analytics agent.
If your clusters are already running the Azure Monitor for containers agent, you can install the Log Analytics agent too and the two agents can work alongside one another without any problems.
Does Azure Defender for Kubernetes support AKS with VMSS nodes?
If your cluster is deployed on an Azure Kubernetes Service virtual machine scale set (VMSS), the Log Analytics agent is not currently supported.
In this article, you learned about Security Center's Kubernetes protection including Azure Defender for Kubernetes.
For related material, see the following articles: