You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With authorization, it is important to understand how updates on one object may cause actions in
@@ -188,30 +189,37 @@ reserved resources like memory, or to provide default limits when none are speci
188
189
A pod definition contains a [security context](/docs/tasks/configure-pod-container/security-context/)
189
190
that allows it to request access to run as a specific Linux user on a node (like root),
190
191
access to run privileged or access the host network, and other controls that would otherwise
191
-
allow it to run unfettered on a hosting node. [Pod security policies](/docs/concepts/policy/pod-security-policy/)
192
-
can limit which users or service accounts can provide dangerous security context settings. For example, pod security policies can limit volume mounts, especially `hostPath`, which are aspects of a pod that should be controlled.
192
+
allow it to run unfettered on a hosting node.
193
+
194
+
You can configure [Pod security admission](/docs/concepts/security/pod-security-admission/)
195
+
to enforce use of a particular [Pod Security Standard](/docs/concepts/security/pod-security-standards/)
196
+
in a {{< glossary_tooltip text="namespace" term_id="namespace" >}}, or to detect breaches.
193
197
-->
194
198
### 控制容器运行的特权
195
199
196
200
Pod 定义包含了一个[安全上下文](/zh/docs/tasks/configure-pod-container/security-context/),
0 commit comments