Skip to content

Commit 6cc9bf8

Browse files
committed
Update PodSecurityStandards to match PodSecurity KEP
1 parent c5e229e commit 6cc9bf8

File tree

3 files changed

+8
-7
lines changed

3 files changed

+8
-7
lines changed

content/en/docs/concepts/security/pod-security-standards.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ enforced/disallowed:
8686
<tr>
8787
<td>Capabilities</td>
8888
<td>
89-
Adding additional capabilities beyond the <a href="https://docs.docker.com/engine/reference/run/#runtime-privilege-and-linux-capabilities">default set</a> must be disallowed.<br>
89+
Adding additional capabilities beyond the <a href="https://docs.docker.com/engine/reference/run/#runtime-privilege-and-linux-capabilities">default set (excluding NET_RAW)</a> must be disallowed.<br>
9090
<br><b>Restricted Fields:</b><br>
9191
spec.containers[*].securityContext.capabilities.add<br>
9292
spec.initContainers[*].securityContext.capabilities.add<br>
@@ -194,7 +194,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
194194
<tr>
195195
<td>Volume Types</td>
196196
<td>
197-
In addition to restricting HostPath volumes, the restricted profile limits usage of non-core volume types to those defined through PersistentVolumes.<br>
197+
In addition to restricting HostPath volumes, the restricted profile limits usage of non-ephemeral volume types to those defined through PersistentVolumes.<br>
198198
<br><b>Restricted Fields:</b><br>
199199
spec.volumes[*].hostPath<br>
200200
spec.volumes[*].gcePersistentDisk<br>
@@ -216,7 +216,6 @@ well as lower-trust users.The following listed controls should be enforced/disal
216216
spec.volumes[*].portworxVolume<br>
217217
spec.volumes[*].scaleIO<br>
218218
spec.volumes[*].storageos<br>
219-
spec.volumes[*].csi<br>
220219
<br><b>Allowed Values:</b> undefined/nil<br>
221220
</td>
222221
</tr>

content/en/examples/policy/baseline-psp.yaml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,13 @@ metadata:
1111
seccomp.security.alpha.kubernetes.io/defaultProfileName: 'unconfined'
1212
spec:
1313
privileged: false
14-
# The moby default capability set, defined here:
15-
# https://github.com/moby/moby/blob/0a5cec2833f82a6ad797d70acbf9cbbaf8956017/oci/caps/defaults.go#L6-L19
14+
# The moby default capability set, minus NET_RAW
1615
allowedCapabilities:
1716
- 'CHOWN'
1817
- 'DAC_OVERRIDE'
1918
- 'FSETID'
2019
- 'FOWNER'
2120
- 'MKNOD'
22-
- 'NET_RAW'
2321
- 'SETGID'
2422
- 'SETUID'
2523
- 'SETFCAP'
@@ -67,6 +65,9 @@ spec:
6765
runAsUser:
6866
rule: 'RunAsAny'
6967
seLinux:
68+
# This policy assumes the nodes are using AppArmor rather than SELinux.
69+
# The PSP SELinux API cannot express the SELinux Pod Security Standards,
70+
# so if using SELinux, you must choose a more restrictive default.
7071
rule: 'RunAsAny'
7172
supplementalGroups:
7273
rule: 'RunAsAny'

content/en/examples/policy/restricted-psp.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,9 @@ spec:
2222
- 'projected'
2323
- 'secret'
2424
- 'downwardAPI'
25-
# Assume that persistentVolumes set up by the cluster admin are safe to use.
25+
# Assume that CSI drivers & persistentVolumes set up by the cluster admin are safe to use.
2626
- 'persistentVolumeClaim'
27+
- 'csi'
2728
hostNetwork: false
2829
hostIPC: false
2930
hostPID: false

0 commit comments

Comments
 (0)