apiVersion: kyverno.io/v1alpha1 kind: ClusterPolicy metadata: name: validate-deny-privileged-priviligedescalation annotations: policies.kyverno.io/category: Security Context policies.kyverno.io/description: Privileged containers are defined as any container where the container uid 0 is mapped to the host’s uid 0. A process within privileged containers can get unrestricted host access. With 'securityContext.allowPrivilegeEscalation' enabled a process can gain privileges from its parent. To disallow privileged containers and the escalation of privileges it is recommended to run pod containers with 'securityContext.priveleged' as 'false' and 'allowPrivilegeEscalation' as 'false'. spec: rules: - name: deny-privileged-priviligedescalation match: resources: kinds: - Pod validate: message: "Privileged mode is not allowed. Set allowPrivilegeEscalation and privileged to false" anyPattern: - spec: securityContext: allowPrivilegeEscalation: false privileged: false - spec: containers: - name: "*" securityContext: allowPrivilegeEscalation: false privileged: false