Skip to content

Commit 9065e16

Browse files
committed
Minor cleanup of standardized pod security
1 parent 44db1a1 commit 9065e16

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

content/en/docs/concepts/security/pod-security-standards.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -56,8 +56,8 @@ developers of non-critical applications. The following listed controls should be
5656
enforced/disallowed:
5757

5858
<table>
59-
<caption style="display:none">Baseline policy specification</caption>
60-
<tbody>
59+
<caption style="display:none">Baseline policy specification</caption>
60+
<tbody>
6161
<tr>
6262
<td><strong>Control</strong></td>
6363
<td><strong>Policy</strong></td>
@@ -115,7 +115,7 @@ enforced/disallowed:
115115
<tr>
116116
<td>AppArmor <em>(optional)</em></td>
117117
<td>
118-
On supported hosts, the `runtime/default` AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to a whitelisted set of profiles.<br>
118+
On supported hosts, the 'runtime/default' AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to a whitelisted set of profiles.<br>
119119
<br><b>Restricted Fields:</b><br>
120120
metadata.annotations['container.apparmor.security.beta.kubernetes.io/*']<br>
121121
<br><b>Allowed Values:</b> 'runtime/default', undefined<br>
@@ -146,14 +146,14 @@ enforced/disallowed:
146146
<td>Sysctls</td>
147147
<td>
148148
Sysctls can disable security mechanisms or affect all containers on a host, and should be disallowed except for a whitelisted "safe" subset.
149-
A sysctl is considered safe if it is namespaced in the container or the pod, and it is isolated from other pods or processes on the same node.<br>
149+
A sysctl is considered safe if it is namespaced in the container or the Pod, and it is isolated from other Pods or processes on the same Node.<br>
150150
<br><b>Restricted Fields:</b><br>
151151
spec.securityContext.sysctls<br>
152152
<br><b>Allowed Values:</b><br>
153-
kernel.shm_rmid_forced<br>
154-
net.ipv4.ip_local_port_range<br>
155-
net.ipv4.tcp_syncookies<br>
156-
net.ipv4.ping_group_range<br>
153+
kernel.shm_rmid_forced<br>
154+
net.ipv4.ip_local_port_range<br>
155+
net.ipv4.tcp_syncookies<br>
156+
net.ipv4.ping_group_range<br>
157157
undefined/empty<br>
158158
</td>
159159
</tr>
@@ -168,7 +168,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
168168

169169

170170
<table>
171-
<caption style="display:none">Restricted policy specification</caption>
171+
<caption style="display:none">Restricted policy specification</caption>
172172
<tbody>
173173
<tr>
174174
<td><strong>Control</strong></td>
@@ -209,7 +209,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
209209
<tr>
210210
<td>Privilege Escalation</td>
211211
<td>
212-
Privilege escalation to root should not be allowed.<br>
212+
Privilege escalation to root should not be allowed.<br>
213213
<br><b>Restricted Fields:</b><br>
214214
spec.containers[*].securityContext.privileged<br>
215215
spec.initContainers[*].securityContext.privileged<br>
@@ -219,7 +219,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
219219
<tr>
220220
<td>Running as Non-root</td>
221221
<td>
222-
Containers must be required to run as non-root users.<br>
222+
Containers must be required to run as non-root users.<br>
223223
<br><b>Restricted Fields:</b><br>
224224
spec.securityContext.runAsNonRoot<br>
225225
spec.containers[*].securityContext.runAsNonRoot<br>
@@ -230,7 +230,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
230230
<tr>
231231
<td>Non-root groups <em>(optional)</em></td>
232232
<td>
233-
Containers should be forbidden from running with a root primary or supplementary GID.<br>
233+
Containers should be forbidden from running with a root primary or supplementary GID.<br>
234234
<br><b>Restricted Fields:</b><br>
235235
spec.securityContext.runAsGroup<br>
236236
spec.securityContext.supplementalGroups[*]<br>
@@ -249,12 +249,12 @@ well as lower-trust users.The following listed controls should be enforced/disal
249249
<tr>
250250
<td>Seccomp</td>
251251
<td>
252-
The runtime/default seccomp profile must be required, or allow additional whitelisted values.<br>
252+
The 'runtime/default' seccomp profile must be required, or allow additional whitelisted values.<br>
253253
<br><b>Restricted Fields:</b><br>
254254
metadata.annotations['seccomp.security.alpha.kubernetes.io/pod']<br>
255255
metadata.annotations['container.seccomp.security.alpha.kubernetes.io/*']<br>
256256
<br><b>Allowed Values:</b><br>
257-
runtime/default<br>
257+
'runtime/default'<br>
258258
undefined (container annotation)<br>
259259
</td>
260260
</tr>

0 commit comments

Comments
 (0)