@@ -56,8 +56,8 @@ developers of non-critical applications. The following listed controls should be
56
56
enforced/disallowed:
57
57
58
58
<table >
59
- <caption style="display:none">Baseline policy specification</caption>
60
- <tbody>
59
+ <caption style="display:none">Baseline policy specification</caption>
60
+ <tbody>
61
61
<tr>
62
62
<td><strong>Control</strong></td>
63
63
<td><strong>Policy</strong></td>
@@ -115,7 +115,7 @@ enforced/disallowed:
115
115
<tr>
116
116
<td>AppArmor <em>(optional)</em></td>
117
117
<td>
118
- On supported hosts, the ` runtime/default` AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to a whitelisted set of profiles.<br>
118
+ On supported hosts, the ' runtime/default' AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to a whitelisted set of profiles.<br>
119
119
<br><b>Restricted Fields:</b><br>
120
120
metadata.annotations['container.apparmor.security.beta.kubernetes.io/*']<br>
121
121
<br><b>Allowed Values:</b> 'runtime/default', undefined<br>
@@ -146,14 +146,14 @@ enforced/disallowed:
146
146
<td>Sysctls</td>
147
147
<td>
148
148
Sysctls can disable security mechanisms or affect all containers on a host, and should be disallowed except for a whitelisted "safe" subset.
149
- A sysctl is considered safe if it is namespaced in the container or the pod , and it is isolated from other pods or processes on the same node .<br>
149
+ A sysctl is considered safe if it is namespaced in the container or the Pod , and it is isolated from other Pods or processes on the same Node .<br>
150
150
<br><b>Restricted Fields:</b><br>
151
151
spec.securityContext.sysctls<br>
152
152
<br><b>Allowed Values:</b><br>
153
- kernel.shm_rmid_forced<br>
154
- net.ipv4.ip_local_port_range<br>
155
- net.ipv4.tcp_syncookies<br>
156
- net.ipv4.ping_group_range<br>
153
+ kernel.shm_rmid_forced<br>
154
+ net.ipv4.ip_local_port_range<br>
155
+ net.ipv4.tcp_syncookies<br>
156
+ net.ipv4.ping_group_range<br>
157
157
undefined/empty<br>
158
158
</td>
159
159
</tr>
@@ -168,7 +168,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
168
168
169
169
170
170
<table >
171
- <caption style="display:none">Restricted policy specification</caption>
171
+ <caption style="display:none">Restricted policy specification</caption>
172
172
<tbody>
173
173
<tr>
174
174
<td><strong>Control</strong></td>
@@ -209,7 +209,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
209
209
<tr>
210
210
<td>Privilege Escalation</td>
211
211
<td>
212
- Privilege escalation to root should not be allowed.<br>
212
+ Privilege escalation to root should not be allowed.<br>
213
213
<br><b>Restricted Fields:</b><br>
214
214
spec.containers[*].securityContext.privileged<br>
215
215
spec.initContainers[*].securityContext.privileged<br>
@@ -219,7 +219,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
219
219
<tr>
220
220
<td>Running as Non-root</td>
221
221
<td>
222
- Containers must be required to run as non-root users.<br>
222
+ Containers must be required to run as non-root users.<br>
223
223
<br><b>Restricted Fields:</b><br>
224
224
spec.securityContext.runAsNonRoot<br>
225
225
spec.containers[*].securityContext.runAsNonRoot<br>
@@ -230,7 +230,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
230
230
<tr>
231
231
<td>Non-root groups <em>(optional)</em></td>
232
232
<td>
233
- Containers should be forbidden from running with a root primary or supplementary GID.<br>
233
+ Containers should be forbidden from running with a root primary or supplementary GID.<br>
234
234
<br><b>Restricted Fields:</b><br>
235
235
spec.securityContext.runAsGroup<br>
236
236
spec.securityContext.supplementalGroups[*]<br>
@@ -249,12 +249,12 @@ well as lower-trust users.The following listed controls should be enforced/disal
249
249
<tr>
250
250
<td>Seccomp</td>
251
251
<td>
252
- The runtime/default seccomp profile must be required, or allow additional whitelisted values.<br>
252
+ The ' runtime/default' seccomp profile must be required, or allow additional whitelisted values.<br>
253
253
<br><b>Restricted Fields:</b><br>
254
254
metadata.annotations['seccomp.security.alpha.kubernetes.io/pod']<br>
255
255
metadata.annotations['container.seccomp.security.alpha.kubernetes.io/*']<br>
256
256
<br><b>Allowed Values:</b><br>
257
- runtime/default<br>
257
+ ' runtime/default' <br>
258
258
undefined (container annotation)<br>
259
259
</td>
260
260
</tr>
0 commit comments