Skip to content

Commit f15cfae

Browse files
authored
Merge pull request #33974 from JimBugwadia/pss
move other policy engines
2 parents 370e527 + fb97ad2 commit f15cfae

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

content/en/docs/concepts/security/pod-security-standards.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -457,6 +457,16 @@ of individual policies are not defined here.
457457
- {{< example file="policy/baseline-psp.yaml" >}}Baseline{{< /example >}}
458458
- {{< example file="policy/restricted-psp.yaml" >}}Restricted{{< /example >}}
459459

460+
### Alternatives
461+
462+
{{% thirdparty-content %}}
463+
464+
Other alternatives for enforcing policies are being developed in the Kubernetes ecosystem, such as:
465+
- [Kubewarden](https://github.com/kubewarden)
466+
- [Kyverno](https://kyverno.io/policies/pod-security/)
467+
- [OPA Gatekeeper](https://github.com/open-policy-agent/gatekeeper)
468+
469+
460470
## FAQ
461471

462472
### Why isn't there a profile between privileged and baseline?
@@ -480,14 +490,6 @@ as well as other related parameters outside the Security Context. As of July 202
480490
[Pod Security Policies](/docs/concepts/security/pod-security-policy/) are deprecated in favor of the
481491
built-in [Pod Security Admission Controller](/docs/concepts/security/pod-security-admission/).
482492

483-
{{% thirdparty-content %}}
484-
485-
Other alternatives for enforcing security profiles are being developed in the Kubernetes
486-
ecosystem, such as:
487-
- [OPA Gatekeeper](https://github.com/open-policy-agent/gatekeeper).
488-
- [Kubewarden](https://github.com/kubewarden).
489-
- [Kyverno](https://kyverno.io/policies/pod-security/).
490-
491493
### What profiles should I apply to my Windows Pods?
492494

493495
Windows in Kubernetes has some limitations and differentiators from standard Linux-based

0 commit comments

Comments
 (0)