1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-06 07:57:07 +00:00
kyverno/test/best_practices/disallow_privileged.yaml

43 lines
1.2 KiB
YAML
Raw Normal View History

---
2019-11-13 13:56:20 -08:00
apiVersion: kyverno.io/v1
2019-11-08 20:04:42 -08:00
kind: ClusterPolicy
metadata:
2019-11-08 20:08:23 -08:00
annotations:
policies.kyverno.io/category: Security
policies.kyverno.io/description: Privileged containers are defined as any container
where the container uid 0 is mapped to the hosts uid 0. A process within a
privileged container can get unrestricted host access. With `securityContext.allowPrivilegeEscalation`
enabled, a process can gain privileges from its parent.
name: disallow-privileged
2019-11-08 20:04:42 -08:00
spec:
admission: true
background: true
2019-11-08 20:04:42 -08:00
rules:
- match:
any:
- resources:
kinds:
- Pod
name: validate-privileged
2019-11-08 20:04:42 -08:00
validate:
message: Privileged mode is not allowed. Set privileged to false
2019-12-30 13:53:51 -08:00
pattern:
spec:
2019-11-08 20:04:42 -08:00
containers:
2019-12-30 13:53:51 -08:00
- =(securityContext):
=(privileged): false
- match:
any:
- resources:
kinds:
- Pod
name: validate-allowPrivilegeEscalation
2019-11-08 20:04:42 -08:00
validate:
message: Privileged mode is not allowed. Set allowPrivilegeEscalation to false
2019-12-30 13:53:51 -08:00
pattern:
spec:
2019-11-08 20:04:42 -08:00
containers:
2019-12-30 13:53:51 -08:00
- securityContext:
2019-11-08 20:04:42 -08:00
allowPrivilegeEscalation: false
validationFailureAction: Audit