1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-06 16:06:56 +00:00
kyverno/samples/README.md
2019-10-09 10:39:25 -07:00

3.2 KiB

Best Practice Policies

Best practice Policy
Run as non-root user deny_runasrootuser.yaml

Additional Policies

Description Policy Details
Check userID, groupIP & fsgroup used inside a Pod Restrict the range of ids used inside a Pod All processes inside the pod can be made to run with specific user and groupID by setting runAsUser and runAsGroup respectively. fsGroup can be specified to make sure any file created in the volume with have the specified groupID.
Assign Linux capabilities inside Pod Verify capabilities add in a Pod Linux divides the privileges traditionally, associated with superuser into distinct units, known as capabilities, which can be independently enabled and disabled by specifying them in capabilities section of securityContext. [List of linux capabilities](https://github.com/torvalds/linux/blob/master/include/uapi/linux/capability.h
Configure kernel parameters The minimum and maximum port a network connection can use as its source(local) port can be validating by checking net.ipv4.ip_local_port_range Sysctl interface allows to modify kernel parameters at runtime and can be specified in the sysctls section of securityContext. list of supported namespaced sysctl interfaces