All Policies

Restricted Pod Security Standards with Spec and Container-Level Control Exemption

The restricted profile of the Pod Security Standards, which is inclusive of the baseline profile, is a collection of all the most common configurations that can be taken to secure Pods. Beginning with Kyverno 1.8, an entire profile may be assigned to the cluster through a single rule. In some cases, specific exemptions must be made on a per-control basis. This policy configures the restricted profile through the latest version of the Pod Security Standards cluster wide while completely exempting Seccomp control check.

Policy Definition

/pod-security/subrule/restricted/restricted-exclude-seccomp/restricted-exclude-seccomp.yaml

1apiVersion: kyverno.io/v1 2kind: ClusterPolicy 3metadata: 4 name: podsecurity-subrule-restricted-seccomp 5 annotations: 6 policies.kyverno.io/title: Restricted Pod Security Standards with Spec and Container-Level Control Exemption 7 policies.kyverno.io/category: Pod Security 8 policies.kyverno.io/severity: medium 9 kyverno.io/kyverno-version: 1.8.0 10 policies.kyverno.io/minversion: 1.8.0 11 kyverno.io/kubernetes-version: "1.24" 12 policies.kyverno.io/subject: Pod 13 policies.kyverno.io/description: >- 14 The restricted profile of the Pod Security Standards, which is inclusive of 15 the baseline profile, is a collection of all the most common configurations 16 that can be taken to secure Pods. Beginning with Kyverno 1.8, an entire profile 17 may be assigned to the cluster through a single rule. In some cases, specific exemptions 18 must be made on a per-control basis. This policy configures the 19 restricted profile through the latest version of the Pod Security Standards cluster wide while 20 completely exempting Seccomp control check. 21spec: 22 background: true 23 validationFailureAction: Enforce 24 rules: 25 - name: restricted-exempt-seccomp 26 match: 27 any: 28 - resources: 29 kinds: 30 - Pod 31 validate: 32 podSecurity: 33 level: restricted 34 version: latest 35 exclude: 36 - controlName: Seccomp 37 - controlName: Seccomp 38 images: 39 - '*'
yaml