diff --git a/content/en/docs/concepts/security/security-checklist.md b/content/en/docs/concepts/security/security-checklist.md index 0bb3c91d4a..6987a6b92a 100644 --- a/content/en/docs/concepts/security/security-checklist.md +++ b/content/en/docs/concepts/security/security-checklist.md @@ -207,21 +207,7 @@ SELinux is only available on Linux nodes, and enabled in ## Logs and auditing - [ ] Audit logs, if enabled, are protected from general access. -- [ ] The `/logs` API is disabled (you are running kube-apiserver with - `--enable-logs-handler=false`). - Kubernetes includes a `/logs` API endpoint, enabled by default, - that lets users request the contents of the API server's `/var/log` directory over HTTP. Accessing - that endpoint requires authentication. - -Allowing broad access to Kubernetes logs can make security information -available to a potential attacker. - -As a good practice, set up a separate means to collect and aggregate -control plane logs, and do not use the `/logs` API endpoint. -Alternatively, if you run your control plane with the `/logs` API endpoint -and limit the content of `/var/log` (within the host or container where the API server is running) to -Kubernetes API server logs only. ## Pod placement