Skip to content

Commit d8a6fd6

Browse files
author
niranjandarshann
committed
fixed broken link
1 parent 648cda5 commit d8a6fd6

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

content/en/docs/concepts/security/pod-security-standards.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -326,7 +326,7 @@ fail validation.
326326
<tr>
327327
<td style="white-space: nowrap">Privilege Escalation (v1.8+)</td>
328328
<td>
329-
<p>Privilege escalation (such as via set-user-ID or set-group-ID file mode) should not be allowed. <em><a href="#policies-specific-to-linux">This is Linux only policy</a> in v1.25+ <code>(spec.os.name != windows)</code></em></p>
329+
<p>Privilege escalation (such as via set-user-ID or set-group-ID file mode) should not be allowed. <em><a href="#OS-specific policy controls">This is Linux only policy</a> in v1.25+ <code>(spec.os.name != windows)</code></em></p>
330330
<p><strong>Restricted Fields</strong></p>
331331
<ul>
332332
<li><code>spec.containers[*].securityContext.allowPrivilegeEscalation</code></li>
@@ -381,7 +381,7 @@ fail validation.
381381
<tr>
382382
<td style="white-space: nowrap">Seccomp (v1.19+)</td>
383383
<td>
384-
<p>Seccomp profile must be explicitly set to one of the allowed values. Both the <code>Unconfined</code> profile and the <em>absence</em> of a profile are prohibited. <em><a href="#policies-specific-to-linux">This is Linux only policy</a> in v1.25+ <code>(spec.os.name != windows)</code></em></p>
384+
<p>Seccomp profile must be explicitly set to one of the allowed values. Both the <code>Unconfined</code> profile and the <em>absence</em> of a profile are prohibited. <em><a href="#OS-specific policy controls">This is Linux only policy</a> in v1.25+ <code>(spec.os.name != windows)</code></em></p>
385385
<p><strong>Restricted Fields</strong></p>
386386
<ul>
387387
<li><code>spec.securityContext.seccompProfile.type</code></li>
@@ -407,7 +407,7 @@ fail validation.
407407
<td>
408408
<p>
409409
Containers must drop <code>ALL</code> capabilities, and are only permitted to add back
410-
the <code>NET_BIND_SERVICE</code> capability. <em><a href="#policies-specific-to-linux">This is Linux only policy</a> in v1.25+ <code>(.spec.os.name != "windows")</code></em>
410+
the <code>NET_BIND_SERVICE</code> capability. <em><a href="#OS-specific policy controls">This is Linux only policy</a> in v1.25+ <code>(.spec.os.name != "windows")</code></em>
411411
</p>
412412
<p><strong>Restricted Fields</strong></p>
413413
<ul>

0 commit comments

Comments
 (0)