|
16 | 16 | "tags": "common" |
17 | 17 | }, |
18 | 18 | "catalogInfo": { |
19 | | - "bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac", |
| 19 | + "bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac", |
20 | 20 | "description": "Ensures that containers do not use SYS_ADMIN capability", |
21 | 21 | "exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings", |
22 | 22 | "remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)." |
|
43 | 43 | "tags": "telco" |
44 | 44 | }, |
45 | 45 | "catalogInfo": { |
46 | | - "bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac", |
| 46 | + "bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac", |
47 | 47 | "description": "Check that pods running on nodes with realtime kernel enabled have the SYS_NICE capability enabled in their spec. In the case that a CNF is running on a node using the real-time kernel, SYS_NICE will be used to allow DPDK application to switch to SCHED_FIFO.", |
48 | 48 | "exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings", |
49 | 49 | "remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)." |
|
70 | 70 | "tags": "common" |
71 | 71 | }, |
72 | 72 | "catalogInfo": { |
73 | | - "bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac", |
| 73 | + "bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac", |
74 | 74 | "description": "Tests that no one has changed the node's sysctl configs after the node was created, the tests works by checking if the sysctl configs are consistent with the MachineConfig CR which defines how the node should be configured", |
75 | 75 | "exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings", |
76 | 76 | "remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)." |
|
97 | 97 | "tags": "common" |
98 | 98 | }, |
99 | 99 | "catalogInfo": { |
100 | | - "bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#redhat-best-practices-for-k8s-security-rbac", |
| 100 | + "bestPracticeReference": "https://redhat-best-practices-for-k8s.github.io/guide/#k8s-best-practices-security-rbac", |
101 | 101 | "description": "Ensures that the Node(s) hosting CNFs do not utilize tainted kernels. This test case is especially important to support Highly Available CNFs, since when a CNF is re-instantiated on a backup Node, that Node's kernel may not have the same hacks.", |
102 | 102 | "exceptionProcess": "Exception possible only for workloads that's cluster wide in nature and absolutely needs cluster level roles \u0026 role bindings", |
103 | 103 | "remediation": "In most cases, Pod's should not have ClusterRoleBindings. The suggested remediation is to remove the need for ClusterRoleBindings, if possible. Cluster roles and cluster role bindings discouraged unless absolutely needed by CNF (often reserved for cluster admin only)." |
|
0 commit comments