Use Kubernetes Pod Security Policy to secure your clusters.
-
Updated
Jul 31, 2021 - Python
Use Kubernetes Pod Security Policy to secure your clusters.
Get started with Kubernetes pod security policies
GKE - Kubernetes best practices for simple demo service.
Replacement for the Kubernetes Pod Security Policy that controls the usage of SELinux
Replacement for the Kubernetes Pod Security Policy that controls the usage of host namespaces
Replacement for the Kubernetes Pod Security Policy that controls the allowed `flexVolume` drivers
A Kubewarden policy that enforces root filesystem to be readonly
Replacement for the Kubernetes Pod Security Policy that controls the usage of volumes
A Kubewarden policy that controls usage of sysctls
Replacement for the Kubernetes Pod Security Policy that controls the usage of hostpaths
Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context
A Kubewarden Pod Security Policy that controls usage of Seccomp profiles
A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation
A Pod Security Policy that controls Container Capabilities
A Kubewarden Pod Security Policy that controls usage of AppArmor profiles
Replacement for the Kubernetes Pod Security Policy that controls the usage of /proc mount types
This Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groups
A Kubewarden Policy that limits the ability to create privileged containers
A Kubewarden Policy that verifies all the signatures of the container images referenced by a Pod
Recreation of common Pod Security Policy configuration in other common Kubernetes policy engines
Add a description, image, and links to the pod-security-policy topic page so that developers can more easily learn about it.
To associate your repository with the pod-security-policy topic, visit your repo's landing page and select "manage topics."