You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Kubernetes simcore: add pod security standard (#1139)
* Kubernetes simcore: add pod security standard
Ensure baseline policy and warn on restricted policy violations. The k8s
way to add pod security standard, is to add labels to the namespace. The
adding labels to namespace is achieved via helmfile hooks.
Add helpful defaults for pod & container security context to ensure
minimal privileges.
WARNING: if deployed pod does not conform with baseline policy, it
SILENTLY won't be scheduled. To see warnings / errors execute `kubectl
-n simcore events'
* #1137
* Improve security readme
This file documents security measures and their configuration in current code base
4
+
5
+
## Application developer
6
+
7
+
Full list: https://kubernetes.io/docs/concepts/security/application-security-checklist/
8
+
9
+
#### Pod-level securityContext recommendations
10
+
11
+
Enable pod security standard on namespace level:
12
+
* create namespace with labels (examples and explanations https://aro-labs.com/pod-security-standards/)
13
+
* configure pod and container security context to satisfy security standards (read more https://medium.com/dynatrace-engineering/kubernetes-security-part-3-security-context-7d44862c4cfa)
14
+
15
+
## Cluster / OPS developers
16
+
17
+
Full list: https://kubernetes.io/docs/concepts/security/security-checklist/
0 commit comments