Use Kubernetes Pod Security Policy to secure your clusters.
-
Updated
Jul 31, 2021 - Python
Use Kubernetes Pod Security Policy to secure your clusters.
GKE - Kubernetes best practices for simple demo service.
Get started with Kubernetes pod security policies
Replacement for the Kubernetes Pod Security Policy that controls the usage of volumes
A Kubewarden policy that enforces root filesystem to be readonly
A Kubewarden policy that controls usage of sysctls
Replacement for the Kubernetes Pod Security Policy that controls the allowed `flexVolume` drivers
Replacement for the Kubernetes Pod Security Policy that controls the usage of SELinux
Replacement for the Kubernetes Pod Security Policy that controls the usage of hostpaths
Recreation of common Pod Security Policy configuration in other common Kubernetes policy engines
A Kubewarden Pod Security Policy that controls usage of Seccomp profiles
Replacement for the Kubernetes Pod Security Policy that controls the usage of /proc mount types
This Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groups
Replacement for the Kubernetes Pod Security Policy that controls the usage of host namespaces
A Kubewarden Pod Security Policy that controls usage of AppArmor profiles
Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context
A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation
A Pod Security Policy that controls Container Capabilities
A Kubewarden Policy that limits the ability to create privileged containers
A Kubewarden Policy that verifies all the signatures of the container images referenced by a Pod
Add a description, image, and links to the pod-security-policy topic page so that developers can more easily learn about it.
To associate your repository with the pod-security-policy topic, visit your repo's landing page and select "manage topics."