You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/concepts/security/pod-security-standards.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ should range from highly restricted to highly flexible:
32
32
33
33
-**_Privileged_** - Unrestricted policy, providing the widest possible level of permissions. This
34
34
policy allows for known privilege escalations.
35
-
-**_Baseline/Default_** - Minimally restrictive policy while preventing known privilege
35
+
-**_Baseline_** - Minimally restrictive policy while preventing known privilege
36
36
escalations. Allows the default (minimally specified) Pod configuration.
37
37
-**_Restricted_** - Heavily restricted policy, following current Pod hardening best practices.
38
38
@@ -48,9 +48,9 @@ mechanisms (such as gatekeeper), the privileged profile may be an absence of app
48
48
rather than an instantiated policy. In contrast, for a deny-by-default mechanism (such as Pod
49
49
Security Policy) the privileged policy should enable all controls (disable all restrictions).
50
50
51
-
### Baseline/Default
51
+
### Baseline
52
52
53
-
The Baseline/Default policy is aimed at ease of adoption for common containerized workloads while
53
+
The Baseline policy is aimed at ease of adoption for common containerized workloads while
54
54
preventing known privilege escalations. This policy is targeted at application operators and
55
55
developers of non-critical applications. The following listed controls should be
56
56
enforced/disallowed:
@@ -115,7 +115,9 @@ enforced/disallowed:
115
115
<tr>
116
116
<td>AppArmor <em>(optional)</em></td>
117
117
<td>
118
-
On supported hosts, the 'runtime/default' AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to an allowed set of profiles.<br>
118
+
On supported hosts, the 'runtime/default' AppArmor profile is applied by default.
119
+
The baseline policy should prevent overriding or disabling the default AppArmor
120
+
profile, or restrict overrides to an allowed set of profiles.<br>
0 commit comments