You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- {{< example file="policy/privileged-psp.yaml" >}}Privileged{{< /example >}}
157
+
- {{< example file="policy/baseline-psp.yaml" >}}Baseline{{< /example >}}
158
+
- {{< example file="policy/restricted-psp.yaml" >}}Restricted{{< /example >}}
158
159
159
-
2. Only bind PSPs to namespaces, by using the `system:serviceaccounts:<namespace>` group (where
160
-
`<namespace>` is the target namespace). For example:
160
+
2. Only bind PSPs to entire namespaces, by using the `system:serviceaccounts:<namespace>` group
161
+
(where `<namespace>` is the target namespace). For example:
161
162
162
163
```yaml
163
164
apiVersion: rbac.authorization.k8s.io/v1
@@ -699,6 +700,10 @@ Refer to the [Sysctl documentation](
699
700
700
701
## {{% heading "whatsnext" %}}
701
702
703
+
- See [PodSecurityPolicy Deprecation: Past, Present, and
704
+
Future](/blog/2021/04/06/podsecuritypolicy-deprecation-past-present-and-future/) to learn about
705
+
the future of pod security policy.
706
+
702
707
- See [Pod Security Standards](/docs/concepts/security/pod-security-standards/) for policy recommendations.
703
708
704
709
- Refer to [Pod Security Policy Reference](/docs/reference/generated/kubernetes-api/{{< param "version" >}}/#podsecuritypolicy-v1beta1-policy) for the api details.
Copy file name to clipboardExpand all lines: content/en/docs/concepts/security/pod-security-standards.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ enforced/disallowed:
86
86
<tr>
87
87
<td>Capabilities</td>
88
88
<td>
89
-
Adding additional capabilities beyond the <a href="https://docs.docker.com/engine/reference/run/#runtime-privilege-and-linux-capabilities">default set (excluding NET_RAW)</a> must be disallowed.<br>
89
+
Adding <tt>NET_RAW</tt> or capabilities beyond the <a href="https://docs.docker.com/engine/reference/run/#runtime-privilege-and-linux-capabilities">default set</a> must be disallowed.<br>
0 commit comments