diff --git a/content/en/docs/concepts/security/pod-security-standards.md b/content/en/docs/concepts/security/pod-security-standards.md index 60cc021ae6..ffe1aa45f2 100644 --- a/content/en/docs/concepts/security/pod-security-standards.md +++ b/content/en/docs/concepts/security/pod-security-standards.md @@ -56,8 +56,8 @@ developers of non-critical applications. The following listed controls should be enforced/disallowed:
Control | Policy | @@ -115,7 +115,7 @@ enforced/disallowed:||
AppArmor (optional) |
- On supported hosts, the `runtime/default` AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to a whitelisted set of profiles. + On supported hosts, the 'runtime/default' AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to a whitelisted set of profiles. Restricted Fields: metadata.annotations['container.apparmor.security.beta.kubernetes.io/*'] Allowed Values: 'runtime/default', undefined @@ -146,14 +146,14 @@ enforced/disallowed: | Sysctls |
Sysctls can disable security mechanisms or affect all containers on a host, and should be disallowed except for a whitelisted "safe" subset.
- A sysctl is considered safe if it is namespaced in the container or the pod, and it is isolated from other pods or processes on the same node. + A sysctl is considered safe if it is namespaced in the container or the Pod, and it is isolated from other Pods or processes on the same Node. Restricted Fields: spec.securityContext.sysctls Allowed Values: - kernel.shm_rmid_forced - net.ipv4.ip_local_port_range - net.ipv4.tcp_syncookies - net.ipv4.ping_group_range + kernel.shm_rmid_forced + net.ipv4.ip_local_port_range + net.ipv4.tcp_syncookies + net.ipv4.ping_group_range undefined/empty |
Control | @@ -209,7 +209,7 @@ well as lower-trust users.The following listed controls should be enforced/disal|
Privilege Escalation |
- Privilege escalation to root should not be allowed. + Privilege escalation to root should not be allowed. Restricted Fields: spec.containers[*].securityContext.privileged spec.initContainers[*].securityContext.privileged @@ -219,7 +219,7 @@ well as lower-trust users.The following listed controls should be enforced/disal |
Running as Non-root |
- Containers must be required to run as non-root users. + Containers must be required to run as non-root users. Restricted Fields: spec.securityContext.runAsNonRoot spec.containers[*].securityContext.runAsNonRoot @@ -230,7 +230,7 @@ well as lower-trust users.The following listed controls should be enforced/disal |
Non-root groups (optional) |
- Containers should be forbidden from running with a root primary or supplementary GID. + Containers should be forbidden from running with a root primary or supplementary GID. Restricted Fields: spec.securityContext.runAsGroup spec.securityContext.supplementalGroups[*] @@ -249,12 +249,12 @@ well as lower-trust users.The following listed controls should be enforced/disal |
Seccomp |
- The runtime/default seccomp profile must be required, or allow additional whitelisted values. + The 'runtime/default' seccomp profile must be required, or allow additional whitelisted values. Restricted Fields: metadata.annotations['seccomp.security.alpha.kubernetes.io/pod'] metadata.annotations['container.seccomp.security.alpha.kubernetes.io/*'] Allowed Values: - runtime/default + 'runtime/default' undefined (container annotation) |