2023-09-17 22:24:26 +00:00
|
|
|
---
|
2019-11-13 21:56:20 +00:00
|
|
|
apiVersion: kyverno.io/v1
|
2019-11-12 01:17:09 +00:00
|
|
|
kind: ClusterPolicy
|
|
|
|
metadata:
|
|
|
|
annotations:
|
|
|
|
policies.kyverno.io/category: Security
|
2023-09-17 22:24:26 +00:00
|
|
|
policies.kyverno.io/description: The Sysctl interface allows modifications to
|
|
|
|
kernel parameters at runtime. In a Kubernetes pod these parameters can be specified
|
|
|
|
under `securityContext.sysctls`. Kernel parameter modifications can be used
|
|
|
|
for exploits and should be restricted.
|
|
|
|
name: disallow-sysctls
|
2019-11-12 01:17:09 +00:00
|
|
|
spec:
|
2023-09-17 22:24:26 +00:00
|
|
|
admission: true
|
|
|
|
background: true
|
2019-11-12 01:17:09 +00:00
|
|
|
rules:
|
2023-09-17 22:24:26 +00:00
|
|
|
- match:
|
|
|
|
any:
|
|
|
|
- resources:
|
|
|
|
kinds:
|
|
|
|
- Pod
|
|
|
|
name: validate-sysctls
|
2019-11-12 01:17:09 +00:00
|
|
|
validate:
|
2023-09-17 22:24:26 +00:00
|
|
|
message: Changes to kernel parameters are not allowed
|
2019-11-12 01:17:09 +00:00
|
|
|
pattern:
|
|
|
|
spec:
|
2020-06-04 00:46:01 +00:00
|
|
|
=(securityContext):
|
2023-09-17 22:24:26 +00:00
|
|
|
X(sysctls): null
|
|
|
|
validationFailureAction: Audit
|