You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/concepts/security/security-checklist.md
+23-12Lines changed: 23 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,7 @@ for further information.
99
99
## Pod security
100
100
101
101
-[ ] RBAC rights to `create`, `update`, `patch`, `delete` workloads is only granted if necessary.
102
-
-[ ] Appropriate Pod Security Standards policy is applied for all namespaces in `enforce` mode.
102
+
-[ ] Appropriate Pod Security Standards policy is applied for all namespaces and enforced.
103
103
-[ ] Memory limit is set for the workloads with a limit equal or inferior to the request.
104
104
-[ ] CPU limit might be set on sensitive workloads.
105
105
-[ ] For nodes that support it, Seccomp is enabled with appropriate syscalls
@@ -114,18 +114,29 @@ on the resource itself, for example, `create` on Pods. Without
114
114
additional admission, the authorization to create these resources allows direct
115
115
unrestricted access to the schedulable nodes of a cluster.
116
116
117
-
[Pod Security Admission](/docs/concepts/security/pod-security-admission/) is an
118
-
admission controller to enable fine-grained authorization of Pod creation and
119
-
updates. It replaces the PodSecurityPolicy admission controller.
120
117
The [Pod Security Standards](/docs/concepts/security/pod-security-standards/)
121
-
define three different policies that restrict how fields can be set in the `PodSpec`.
122
-
For a hands-on tutorial on Pod Security, see the blog post
123
-
"[Kubernetes 1.23: Pod Security Graduates to Beta](/blog/2021/12/09/pod-security-admission-beta/)".
124
-
125
-
Pod Security admission `restricted` policy [can operate in several modes](/docs/concepts/security/pod-security-admission/#pod-security-admission-labels-for-namespaces),
126
-
`enforce`, `audit` or `warn` to help properly set the [security context](/docs/tasks/configure-pod-container/security-context/)
127
-
according to security best practices. Nevertheless, pods' [security context](/docs/tasks/configure-pod-container/security-context/)
128
-
should be separately investigated to limit the privileges and access pods may have.
118
+
define three different policies, privileged, baseline and restricted that limit
119
+
how fields can be set in the `PodSpec` regarding security.
120
+
These standards can be enforced at the namespace level with the new
0 commit comments