Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: fix kernel lockdown documentation #1704

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -476,7 +476,7 @@ Here are the metrics settings:
#### Kernel settings

* `settings.kernel.lockdown`: This allows further restrictions on what the Linux kernel will allow, for example preventing the loading of unsigned modules.
May be set to "none" (the default), "integrity", or "confidentiality".
May be set to "none" (the default in older [variants](variants/), up through aws-k8s-1.19), "integrity" (the default for newer [variants](variants/)), or "confidentiality".
**Important note:** this setting cannot be lowered (toward 'none') at runtime.
You must reboot for a change to a lower level to take effect.
* `settings.kernel.sysctl`: Key/value pairs representing Linux kernel parameters.
Expand Down
2 changes: 1 addition & 1 deletion SECURITY_GUIDANCE.md
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ Modifications to the running kernel could bypass or subvert these mechanisms.
Bottlerocket enables the Lockdown security module and offers settings to choose from one of three modes.

The first mode, "none", effectively disables the protection.
This is the default in older [variants](variants/) of Bottlerocket, for compatibility with existing deployments.
This is the default in older [variants](variants/) of Bottlerocket up through aws-k8s-1.19, for compatibility with existing deployments.

The second mode, "integrity", blocks most ways to overwrite the kernel's memory and modify its code.
This is the default in newer variants.
Expand Down