mirror of
https://github.com/ghndrx/k8s-manifests.git
synced 2026-02-10 06:45:09 +00:00
- Add namespace templates for privileged, baseline, and restricted levels - Include compliant deployment examples for baseline and restricted - Add migration audit script for checking namespace compliance - Document PSA levels, enforcement modes, and migration strategy Follows Kubernetes Pod Security Admission best practices for 2025+. Reference: https://kubernetes.io/docs/concepts/security/pod-security-standards/
35 lines
1.1 KiB
YAML
35 lines
1.1 KiB
YAML
# Restricted namespace - maximum security hardening
|
|
# For sensitive workloads and untrusted code
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: restricted-apps
|
|
labels:
|
|
# PSA labels - restricted at all levels
|
|
pod-security.kubernetes.io/enforce: restricted
|
|
pod-security.kubernetes.io/enforce-version: latest
|
|
pod-security.kubernetes.io/audit: restricted
|
|
pod-security.kubernetes.io/audit-version: latest
|
|
pod-security.kubernetes.io/warn: restricted
|
|
pod-security.kubernetes.io/warn-version: latest
|
|
# Metadata
|
|
environment: production
|
|
security-level: restricted
|
|
annotations:
|
|
description: "Restricted security for sensitive and untrusted workloads"
|
|
---
|
|
# Restricted REQUIRES:
|
|
# - runAsNonRoot: true
|
|
# - allowPrivilegeEscalation: false
|
|
# - Drop ALL capabilities (except NET_BIND_SERVICE)
|
|
# - seccompProfile: RuntimeDefault or Localhost
|
|
# - Read-only root filesystem (recommended)
|
|
#
|
|
# Restricted BLOCKS:
|
|
# - Everything baseline blocks, plus:
|
|
# - Running as root
|
|
# - Privilege escalation
|
|
# - Most capabilities
|
|
# - HostPath volumes
|
|
# - Writable root filesystems (warning only)
|