2023-09-18 00:24:26 +02:00
|
|
|
---
|
|
|
|
apiVersion: kyverno.io/v1
|
2019-11-10 21:57:20 -08:00
|
|
|
kind: ClusterPolicy
|
|
|
|
metadata:
|
|
|
|
annotations:
|
|
|
|
policies.kyverno.io/category: Security
|
2023-09-18 00:24:26 +02:00
|
|
|
policies.kyverno.io/description: Kubernetes automatically mounts service account
|
|
|
|
credentials in each pod. The service account may be assigned roles allowing
|
|
|
|
pods to access API resources. To restrict access, opt out of auto-mounting tokens
|
|
|
|
by setting automountServiceAccountToken to false.
|
|
|
|
name: restrict-automount-sa-token
|
2019-11-10 21:57:20 -08:00
|
|
|
spec:
|
2023-09-18 00:24:26 +02:00
|
|
|
admission: true
|
|
|
|
background: true
|
2019-11-10 21:57:20 -08:00
|
|
|
rules:
|
2023-09-18 00:24:26 +02:00
|
|
|
- match:
|
|
|
|
any:
|
|
|
|
- resources:
|
|
|
|
kinds:
|
|
|
|
- Pod
|
|
|
|
name: validate-automountServiceAccountToken
|
2019-11-10 21:57:20 -08:00
|
|
|
validate:
|
2023-09-18 00:24:26 +02:00
|
|
|
message: Auto-mounting of Service Account tokens is not allowed
|
2019-11-10 21:57:20 -08:00
|
|
|
pattern:
|
|
|
|
spec:
|
2023-09-18 00:24:26 +02:00
|
|
|
automountServiceAccountToken: false
|
|
|
|
validationFailureAction: Audit
|