litmus/mkdocs/docs/experiments/concepts/security/restricted-policies.yaml

46 lines
1.4 KiB
YAML

apiVersion: kyverno.io/v1
kind: ClusterPolicy
metadata:
name: deny-privilege-escalation
annotations:
policies.kyverno.io/category: Pod Security Standards (Restricted)
policies.kyverno.io/severity: medium
policies.kyverno.io/subject: Pod
policies.kyverno.io/description: >-
Privilege escalation, such as via set-user-ID or set-group-ID file mode, should not be allowed.
This policy ensures the `allowPrivilegeEscalation` fields are either undefined
or set to `false`.
spec:
background: true
validationFailureAction: enforce
rules:
- name: deny-privilege-escalation
match:
resources:
kinds:
- Pod
exclude:
clusterRoles:
# add litmus cluster roles here
- litmus-admin
roles:
# add litmus roles here
- litmus-roles
subjects:
# add serviceAccount name here
- kind: ServiceAccount
name: pod-network-loss-sa
validate:
message: >-
Privilege escalation is disallowed. The fields
spec.containers[*].securityContext.allowPrivilegeEscalation, and
spec.initContainers[*].securityContext.allowPrivilegeEscalation must
be undefined or set to `false`.
pattern:
spec:
=(initContainers):
- =(securityContext):
=(allowPrivilegeEscalation): "false"
containers:
- =(securityContext):
=(allowPrivilegeEscalation): "false"