Skip to content

Commit b9f9f71

Browse files
authored
Merge pull request #26576 from tallclair/pss
Remove "defalut" from the baseline policy name
2 parents 7a8ef52 + 6645f39 commit b9f9f71

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

content/en/docs/concepts/security/pod-security-standards.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ should range from highly restricted to highly flexible:
3232

3333
- **_Privileged_** - Unrestricted policy, providing the widest possible level of permissions. This
3434
policy allows for known privilege escalations.
35-
- **_Baseline/Default_** - Minimally restrictive policy while preventing known privilege
35+
- **_Baseline_** - Minimally restrictive policy while preventing known privilege
3636
escalations. Allows the default (minimally specified) Pod configuration.
3737
- **_Restricted_** - Heavily restricted policy, following current Pod hardening best practices.
3838

@@ -48,9 +48,9 @@ mechanisms (such as gatekeeper), the privileged profile may be an absence of app
4848
rather than an instantiated policy. In contrast, for a deny-by-default mechanism (such as Pod
4949
Security Policy) the privileged policy should enable all controls (disable all restrictions).
5050

51-
### Baseline/Default
51+
### Baseline
5252

53-
The Baseline/Default policy is aimed at ease of adoption for common containerized workloads while
53+
The Baseline policy is aimed at ease of adoption for common containerized workloads while
5454
preventing known privilege escalations. This policy is targeted at application operators and
5555
developers of non-critical applications. The following listed controls should be
5656
enforced/disallowed:
@@ -115,7 +115,9 @@ enforced/disallowed:
115115
<tr>
116116
<td>AppArmor <em>(optional)</em></td>
117117
<td>
118-
On supported hosts, the 'runtime/default' AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to an allowed set of profiles.<br>
118+
On supported hosts, the 'runtime/default' AppArmor profile is applied by default.
119+
The baseline policy should prevent overriding or disabling the default AppArmor
120+
profile, or restrict overrides to an allowed set of profiles.<br>
119121
<br><b>Restricted Fields:</b><br>
120122
metadata.annotations['container.apparmor.security.beta.kubernetes.io/*']<br>
121123
<br><b>Allowed Values:</b> 'runtime/default', undefined<br>
@@ -175,7 +177,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
175177
<td><strong>Policy</strong></td>
176178
</tr>
177179
<tr>
178-
<td colspan="2"><em>Everything from the default profile.</em></td>
180+
<td colspan="2"><em>Everything from the baseline profile.</em></td>
179181
</tr>
180182
<tr>
181183
<td>Volume Types</td>
@@ -275,7 +277,7 @@ of individual policies are not defined here.
275277

276278
## FAQ
277279

278-
### Why isn't there a profile between privileged and default?
280+
### Why isn't there a profile between privileged and baseline?
279281

280282
The three profiles defined here have a clear linear progression from most secure (restricted) to least
281283
secure (privileged), and cover a broad set of workloads. Privileges required above the baseline

0 commit comments

Comments
 (0)