Skip to content

Commit eb962b4

Browse files
committed
Rewrite the part on the Pod Security standards and admission
1 parent a430538 commit eb962b4

File tree

1 file changed

+23
-12
lines changed

1 file changed

+23
-12
lines changed

content/en/docs/concepts/security/security-checklist.md

Lines changed: 23 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ for further information.
9999
## Pod security
100100

101101
- [ ] RBAC rights to `create`, `update`, `patch`, `delete` workloads is only granted if necessary.
102-
- [ ] Appropriate Pod Security Standards policy is applied for all namespaces in `enforce` mode.
102+
- [ ] Appropriate Pod Security Standards policy is applied for all namespaces and enforced.
103103
- [ ] Memory limit is set for the workloads with a limit equal or inferior to the request.
104104
- [ ] CPU limit might be set on sensitive workloads.
105105
- [ ] For nodes that support it, Seccomp is enabled with appropriate syscalls
@@ -114,18 +114,29 @@ on the resource itself, for example, `create` on Pods. Without
114114
additional admission, the authorization to create these resources allows direct
115115
unrestricted access to the schedulable nodes of a cluster.
116116

117-
[Pod Security Admission](/docs/concepts/security/pod-security-admission/) is an
118-
admission controller to enable fine-grained authorization of Pod creation and
119-
updates. It replaces the PodSecurityPolicy admission controller.
120117
The [Pod Security Standards](/docs/concepts/security/pod-security-standards/)
121-
define three different policies that restrict how fields can be set in the `PodSpec`.
122-
For a hands-on tutorial on Pod Security, see the blog post
123-
"[Kubernetes 1.23: Pod Security Graduates to Beta](/blog/2021/12/09/pod-security-admission-beta/)".
124-
125-
Pod Security admission `restricted` policy [can operate in several modes](/docs/concepts/security/pod-security-admission/#pod-security-admission-labels-for-namespaces),
126-
`enforce`, `audit` or `warn` to help properly set the [security context](/docs/tasks/configure-pod-container/security-context/)
127-
according to security best practices. Nevertheless, pods' [security context](/docs/tasks/configure-pod-container/security-context/)
128-
should be separately investigated to limit the privileges and access pods may have.
118+
define three different policies, privileged, baseline and restricted that limit
119+
how fields can be set in the `PodSpec` regarding security.
120+
These standards can be enforced at the namespace level with the new
121+
[Pod Security](/docs/concepts/security/pod-security-admission/) admission,
122+
enabled by default, or by third-party admission webhook. Please note that,
123+
contrary to the removed PodSecurityPolicy admission it replaces,
124+
[Pod Security](/docs/concepts/security/pod-security-admission/)
125+
admission can be easily combined with admission webhooks and external services.
126+
127+
Pod Security admission `restricted` policy, the most restrictive policy of the
128+
[Pod Security Standards](/docs/concepts/security/pod-security-standards/) set,
129+
[can operate in several modes](/docs/concepts/security/pod-security-admission/#pod-security-admission-labels-for-namespaces),
130+
`warn`, `audit` or `enforce` to gradually apply the most appropriate
131+
[security context](/docs/tasks/configure-pod-container/security-context/)
132+
according to security best practices. Nevertheless, pods'
133+
[security context](/docs/tasks/configure-pod-container/security-context/)
134+
should be separately investigated to limit the privileges and access pods may
135+
have on top of the predefined security standards, for specific use cases.
136+
137+
For a hands-on tutorial on [Pod Security](/docs/concepts/security/pod-security-admission/),
138+
see the blog post
139+
[Kubernetes 1.23: Pod Security Graduates to Beta](/blog/2021/12/09/pod-security-admission-beta/).
129140

130141
[Memory and CPU limits](/docs/concepts/configuration/manage-resources-containers/)
131142
should be set in order to restrict the memory and CPU resources a pod can

0 commit comments

Comments
 (0)