mirror of https://github.com/istio/istio.io.git
update psp (#4977)
This commit is contained in:
parent
12e19aa38c
commit
9dae69638c
|
|
@ -86,16 +86,16 @@ $ kubectl exec -it $(kubectl get pod -l app=sleep -n foo -o jsonpath={.items..me
|
||||||
|
|
||||||
As you can see there is no secret file mounted at `/etc/certs` folder.
|
As you can see there is no secret file mounted at `/etc/certs` folder.
|
||||||
|
|
||||||
## Increasing security with pod security policies
|
## Securing SDS with pod security policies
|
||||||
|
|
||||||
The Istio Secret Discovery Service (SDS) uses the Citadel agent to distribute the certificate to the
|
The Istio Secret Discovery Service (SDS) uses the Citadel agent to distribute the certificate to the
|
||||||
Envoy sidecar via a Unix domain socket. All pods running in the same Kubernetes node share the Citadel
|
Envoy sidecar via a Unix domain socket. All pods running in the same Kubernetes node share the Citadel
|
||||||
agent and Unix domain socket.
|
agent and Unix domain socket.
|
||||||
|
|
||||||
To prevent malicious modifications to the Unix domain socket, enable the [pod security policy](https://kubernetes.io/docs/concepts/policy/pod-security-policy/)
|
To prevent unexpected modifications to the Unix domain socket, enable the [pod security policy](https://kubernetes.io/docs/concepts/policy/pod-security-policy/)
|
||||||
to restrict the pod's permission on the Unix domain socket. Otherwise, a malicious pod could hijack the
|
to restrict the pod's permission on the Unix domain socket. Otherwise, a malicious user who has the
|
||||||
Unix domain socket to break the SDS service or steal the identity credentials from other pods running
|
permission to modify the deployment could hijack the Unix domain socket to break the SDS service or
|
||||||
on the same Kubernetes node.
|
steal the identity credentials from other pods running on the same Kubernetes node.
|
||||||
|
|
||||||
To enable the pod security policy, perform the following steps:
|
To enable the pod security policy, perform the following steps:
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue