|
1 | 1 | --- |
2 | 2 | title: Kubernetes Nodes Vulnerability Assessment |
3 | 3 | description: Learn about Defender for Containers vulnerability assessment for Kubernetes nodes. |
4 | | -ms.date: 03/09/2026 |
5 | | -ms.topic: concept-article |
| 4 | +ms.date: 04/09/2026 |
| 5 | +ms.topic: how-to |
6 | 6 | ms.custom: sfi-image-nochange |
7 | 7 | --- |
8 | 8 |
|
9 | | -# Kubernetes node vulnerability assessment |
| 9 | +# Review and remediate Kubernetes node vulnerabilities |
10 | 10 |
|
11 | | -Defender for Cloud can scan the [VMs that host Kubernetes nodes](./kubernetes-nodes-overview.md#protection-for-kubernetes-nodes) to assess vulnerabilities to the OS and installed software. Recommendations for remediation are generated for the customer security team to review and remediate as part of the [shared responsibility](./kubernetes-nodes-overview.md#shared-responsibility-of-kubernetes-nodes) to maintain the Kubernetes nodes of a cluster. |
| 11 | +Defender for Cloud scans the [VMs that host Kubernetes nodes](./kubernetes-nodes-overview.md#protection-for-kubernetes-nodes) for vulnerabilities in the operating system and installed software. When vulnerabilities are detected, Defender for Cloud generates recommendations to help you review and remediate them as part of the [shared responsibility](./kubernetes-nodes-overview.md#shared-responsibility-of-kubernetes-nodes) for maintaining Kubernetes node security. |
12 | 12 |
|
13 | | -## Prerequisite |
| 13 | +## Prerequisites |
14 | 14 |
|
15 | | -Vulnerability assessment of the nodes must be [enabled by turning on the **Agentless scanning for machines**](./kubernetes-nodes-overview.md#enable-agentless-scanning-for-machines) option in the Defender for Containers, Defender Cloud Security Posture Management, or Defender for Servers P2 plan. |
| 15 | +Before you begin, make sure that: |
16 | 16 |
|
17 | | -## Review the Kubernetes node vulnerability recommendations |
| 17 | +- You have an Azure subscription. If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn) before you begin. |
| 18 | + |
| 19 | +- [Microsoft Defender for Cloud is enabled on your subscription](connect-azure-subscription.md) with one of the following plans: |
| 20 | + - Defender for Containers |
| 21 | + - Defender for Servers P2 |
| 22 | + - Defender CSPM |
18 | 23 |
|
19 | | -If vulnerabilities are found for a Kubernetes node, a recommendation is generated for the customer to review. To review Kubernetes node recommendations for remediation: |
| 24 | +- [Agentless scanning for machines](kubernetes-nodes-overview.md#enable-agentless-scanning-for-machines) is enabled. |
| 25 | + |
| 26 | +## Review the Kubernetes node vulnerability recommendations |
20 | 27 |
|
21 | 28 | 1. Sign in to the [Azure portal](https://portal.azure.com). |
22 | 29 |
|
23 | | -1. Search for and select **Microsoft Defender for Cloud**. |
24 | | - |
25 | | -1. Select **Recommendations**. |
26 | | - |
27 | | - :::image type="content" source="media/kubernetes-nodes-va/recommendations-list.png" alt-text="Screenshot of selecting the recommendations submenu of the Defender for Cloud pane." lightbox="media/kubernetes-nodes-va/recommendations-list.png"::: |
| 30 | +1. Go to **Microsoft Defender for Cloud** > **Recommendations**. |
28 | 31 |
|
29 | 32 | 1. Search for and select the `AKS nodes should have vulnerability findings resolved` recommendation. |
30 | 33 |
|
31 | 34 | :::image type="content" source="media/kubernetes-nodes-va/recommendations-list-select-nodes-va.png" alt-text="Screenshot showing the selection of the nodes recommendation line." lightbox="media/kubernetes-nodes-va/recommendations-list-select-nodes-va.png"::: |
32 | 35 |
|
33 | | -1. The full details of the Kubernetes node recommendation are shown. Along with a full description of the vulnerability, other details such as the name of the affected Kubernetes node pool and its cluster are presented. |
| 36 | +1. The full details of the Kubernetes node recommendation are shown. Along with a full description of the vulnerability, other details such as the name of the affected Kubernetes node pool and its cluster are presented. -> change to something like review the blabla |
34 | 37 |
|
35 | 38 | :::image type="content" source="media/kubernetes-nodes-va/recommendation-node-details.png" alt-text="Screenshot showing the details of the recommendation for the Kubernetes node." lightbox="media/kubernetes-nodes-va/recommendation-node-details.png"::: |
36 | 39 |
|
37 | 40 | 1. Select **Findings**. |
38 | 41 |
|
39 | 42 | :::image type="content" source="media/kubernetes-nodes-va/recommendation-node-details-findings.png" alt-text="Screenshot of selecting the findings tab to view a list of CVEs related to the Kubernetes node." lightbox="media/kubernetes-nodes-va/recommendation-node-details-findings.png"::: |
40 | 43 |
|
41 | | -1. Select a CVE. |
| 44 | +1. Select a CVE. (add to view_) |
42 | 45 |
|
43 | 46 | :::image type="content" source="media/kubernetes-nodes-va/recommendation-node-cve-detail.png" alt-text="Screenshot of the pane showing all the details of the CVE and Kubernetes node resources affected." lightbox="media/kubernetes-nodes-va/recommendation-node-cve-details.png"::: |
44 | 47 |
|
45 | | -In the details pane, the **Node pool instances** section shows the nodes to be affected by the remediation. The **More affected resources** shows other nodes that have the same CVE and should be remediated as well. |
| 48 | +In the details pane, the **Node pool instances** section shows the nodes to be affected by the remediation. The **More affected resources** shows other nodes that have the same CVE and should be remediated as well. (this can be deleted) |
46 | 49 |
|
47 | 50 | ## Remediate Kubernetes node vulnerabilities |
48 | 51 |
|
49 | | -Kubernetes node vulnerabilities are remediated by updating the node pool VM image version. The customer upgrades the node pool, as part of the shared responsibility between the Kubernetes service and the customer. The customer upgrades the node pool in one of two ways - either upgrade the node pool VM image and/or the cluster's Kubernetes service, to a newer version. **It is recommended to upgrade the node pool VM image first.** In some cases, the customer needs to upgrade the cluster's Kubernetes service version and the node pool VM image version to remediate the vulnerability. |
| 52 | +Kubernetes node vulnerabilities are remediated by updating the node pool VM image version. The customer upgrades the node pool, as part of the shared responsibility between the Kubernetes service and the customer. The customer upgrades the node pool in one of two ways - either upgrade the node pool VM image and/or the cluster's Kubernetes service, to a newer version. **It is recommended to upgrade the node pool VM image first.** In some cases, the customer needs to upgrade the cluster's Kubernetes service version and the node pool VM image version to remediate the vulnerability. (do i need this? can imove it if i need it?) |
50 | 53 |
|
51 | 54 | > [!IMPORTANT] |
52 | | -> The cluster's Kubernetes version and the node pool VM image can be [set to auto-upgrade](/azure/aks/upgrade-cluster#configure-automatic-upgrades). These versions should be [regularly upgraded](/azure/aks/upgrade-cluster) to provide maximum security for you AKS resources. |
| 55 | +> The cluster's Kubernetes version and the node pool VM image can be [set to auto-upgrade](/azure/aks/upgrade-cluster#configure-automatic-upgrades). These versions should be [regularly upgraded](/azure/aks/upgrade-cluster) to provide maximum security for you AKS resources. (is this needed?) |
53 | 56 |
|
54 | | -### Upgrade the node pool VM image |
| 57 | +### Upgrade the node pool VM image |
55 | 58 |
|
56 | 59 | 1. Sign in to the [Azure portal](https://portal.azure.com). |
57 | 60 |
|
|
0 commit comments