-
Notifications
You must be signed in to change notification settings - Fork 350
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
securing KubeArmor pods and policies #1186
Comments
Potential Solution
|
For protecting KubeArmor with KubeArmor in BPF LSM, we need to:
|
|
Edge Case
|
Regarding "Use baseline level in enforce mode Pod Security Admission for KubeArmor namespace", how about providing a Namespace manifest within the Helm chart which already provide the specific labels to set the Pod Security Standards on it. This way users could for example deploy the Chart via Helm and use their own Namespace via |
Prioritize
Future
|
Host pathsKubeArmor
Snitch
Controller
|
CapabilitiesKubeArmor/InitContainer
Snitch
|
Yep! This seems fairly straight and user friendly. Thanks for the suggestion @dirsigler. |
Signing container images |
Please complete and merge this before the KubeArmor Incubation application can be picked up for Due Diligence. |
KubeArmor is a security engine and thus it is imperative that it follows all the security best practices. The aim is to ensure security of the KubeArmor itself. Much of the work towards following best security practices (such as not using privileged flag) is already followed. It is now time to notch up the security practices to next level. The proposition is as follows:
baseline
level inenforce
mode Pod Security Admission for KubeArmor namespacePredefined hardening policy for checking any changes to
/sys/kernel/debug/kprobes/enabled
The text was updated successfully, but these errors were encountered: