Security Best Practices
Follow these recommendations to harden your Access Analyzer deployment.
License Key Protection
Your Netwrix license key provides access to the OCI package registry. Treat it as a credential:
-
Do not commit license keys to version control
-
Do not store license keys in plaintext configuration files
-
Clear shell history after setting the
LICENSE_KEYenvironment variable:history -c
Network Security
- Restrict access to the K3s API server (port 6443) to trusted networks only
- Limit inbound access to the Access Analyzer web interface to authorized IP ranges
- Use firewall rules to allow only the minimum required outbound endpoints — see Network Configuration
TLS / SSL
- Replace the default self-signed certificate with a certificate issued by a trusted CA for production use
- Ensure outbound TLS verification is enabled by mounting your organization's CA bundle — see SSL / TLS Configuration
RBAC and Access Control
- Limit the number of administrator accounts
- Use the Viewer role for users who only need read access
- Review user accounts periodically and remove unused accounts
Token and Credential Rotation
-
Rotate the ArgoCD admin password after initial setup:
kubectl -n argocd patch secret argocd-initial-admin-secret \-p '{"data": {"password": "'$(echo -n '<NEW_PASSWORD>' | base64)'"}}' -
Rotate service account credentials on a regular schedule
Audit Logging
-
Access Analyzer maintains an audit log of user actions — review it regularly in Settings > Audit Logs
-
Monitor the installer log at
/var/log/dspm-installer.logfor installation-related events -
Monitor ArgoCD logs for application sync events:
kubectl logs -n argocd deployment/argocd-server
Kubernetes Security
- Secrets at rest are encrypted by default (K3s
--secrets-encryptionflag) - Kubeconfig file permissions are set to
644— restrict further if the VM is shared - Regularly apply OS security patches to the host VM