All Products
Search
Document Center

Container Service for Kubernetes:Shared responsibility model

Last Updated:Mar 26, 2026

In Container Service for Kubernetes (ACK) managed clusters, security is a shared responsibility between Alibaba Cloud and you. ACK is responsible for ensuring the security of the infrastructure resources on which ACK clusters are deployed and the security of control plane components and etcd. You are responsible for securing your applications, workloads, and the cluster configuration you control.

Knowing this boundary before you design and deploy your systems helps you identify which security tasks require your action.

What Alibaba Cloud is responsible for

Alibaba Cloud manages the security of the control plane and the infrastructure it runs on:

  • Control plane infrastructure: Computing, storage, and network resources that underpin ACK control planes are secured and managed by Alibaba Cloud.

  • Control plane hardening: Control plane component configurations and images are hardened against security baselines defined by security protection features such as Alibaba Cloud Linux Security Hardening.

  • Vulnerability notifications: When OS or Kubernetes component vulnerabilities are discovered, Alibaba Cloud releases vulnerability notices at the earliest opportunity and releases patches, new OS versions, or new component versions to fix them.

  • Security tooling: Alibaba Cloud provides security protection features and security best practices for enterprise-grade cloud-native application lifecycle management.

What you are responsible for

You are responsible for the security of everything you deploy and configure on the cluster:

LayerResponsibility
OS and runtimeApply OS, system component, and container runtime vulnerability patches based on notices and updates from Alibaba Cloud.
Cluster configurationConfigure ACK clusters, node pools, and network resources according to security principles. Avoid security parameters or permission settings that could be exploited.
Access controlFollow the principle of least privilege. Grant only required permissions to applications, accounts, and roles when managing credentials, deploying security policies, and configuring security parameters.
Supply chainEnsure supply chain security for application artifacts.
Data and runtime securityProtect sensitive data and secure the application runtime environment.
OffboardingWhen you delete RAM users or RAM roles for resigned employees or untrusted individuals, their Role-Based Access Control (RBAC) permissions in the kubeconfig file will not be automatically revoked. Revoke the kubeconfig credential before deleting the RAM user or RAM role. See Revoke a KubeConfig credential.

Responsibility boundaries by cluster type

The following diagrams show how the responsibility boundary shifts depending on your cluster type.

ACK managed clusters

image

ACK Serverless clusters and ack-virtual-node

When you use ACK Serverless clusters or deploy ack-virtual-node in an ACK managed cluster, Alibaba Cloud ensures the security of the control plane components, infrastructure, and the Elastic Container Instance (ECI) that each pod runs on. Your responsibility is to recreate pods so that patches can take effect.

image

Managed node pools in ACK managed clusters

With managed node pools, Alibaba Cloud can automate OS vulnerability patching and kubelet version updates based on your node pool configuration. OS patches are provided by Security Center. If you deploy nodes using custom OS images, OS vulnerabilities can only be manually patched.

image