diff --git a/content/en/docs/concepts/security/pod-security-standards.md b/content/en/docs/concepts/security/pod-security-standards.md index 60cc021ae6..ffe1aa45f2 100644 --- a/content/en/docs/concepts/security/pod-security-standards.md +++ b/content/en/docs/concepts/security/pod-security-standards.md @@ -56,8 +56,8 @@ developers of non-critical applications. The following listed controls should be enforced/disallowed: - - + + @@ -115,7 +115,7 @@ enforced/disallowed: @@ -168,7 +168,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
Baseline policy specificationBaseline policy specification
Control Policy
AppArmor (optional) - On supported hosts, the `runtime/default` AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to a whitelisted set of profiles.
+ On supported hosts, the 'runtime/default' AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to a whitelisted set of profiles.

Restricted Fields:
metadata.annotations['container.apparmor.security.beta.kubernetes.io/*']

Allowed Values: 'runtime/default', undefined
@@ -146,14 +146,14 @@ enforced/disallowed:
Sysctls Sysctls can disable security mechanisms or affect all containers on a host, and should be disallowed except for a whitelisted "safe" subset. - A sysctl is considered safe if it is namespaced in the container or the pod, and it is isolated from other pods or processes on the same node.
+ A sysctl is considered safe if it is namespaced in the container or the Pod, and it is isolated from other Pods or processes on the same Node.

Restricted Fields:
spec.securityContext.sysctls

Allowed Values:
- kernel.shm_rmid_forced
- net.ipv4.ip_local_port_range
- net.ipv4.tcp_syncookies
- net.ipv4.ping_group_range
+ kernel.shm_rmid_forced
+ net.ipv4.ip_local_port_range
+ net.ipv4.tcp_syncookies
+ net.ipv4.ping_group_range
undefined/empty
- + @@ -209,7 +209,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
Restricted policy specificationRestricted policy specification
Control
Privilege Escalation - Privilege escalation to root should not be allowed.
+ Privilege escalation to root should not be allowed.

Restricted Fields:
spec.containers[*].securityContext.privileged
spec.initContainers[*].securityContext.privileged
@@ -219,7 +219,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
Running as Non-root - Containers must be required to run as non-root users.
+ Containers must be required to run as non-root users.

Restricted Fields:
spec.securityContext.runAsNonRoot
spec.containers[*].securityContext.runAsNonRoot
@@ -230,7 +230,7 @@ well as lower-trust users.The following listed controls should be enforced/disal
Non-root groups (optional) - Containers should be forbidden from running with a root primary or supplementary GID.
+ Containers should be forbidden from running with a root primary or supplementary GID.

Restricted Fields:
spec.securityContext.runAsGroup
spec.securityContext.supplementalGroups[*]
@@ -249,12 +249,12 @@ well as lower-trust users.The following listed controls should be enforced/disal
Seccomp - The runtime/default seccomp profile must be required, or allow additional whitelisted values.
+ The 'runtime/default' seccomp profile must be required, or allow additional whitelisted values.

Restricted Fields:
metadata.annotations['seccomp.security.alpha.kubernetes.io/pod']
metadata.annotations['container.seccomp.security.alpha.kubernetes.io/*']

Allowed Values:
- runtime/default
+ 'runtime/default'
undefined (container annotation)