Skip to content

Commit c3a2b61

Browse files
committed
docs: generating the kyvernos policies from code
1 parent b51e4b4 commit c3a2b61

1 file changed

Lines changed: 15 additions & 4 deletions

File tree

docs/docs/platform/security/kyverno.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
# Kyverno Policies
22

3-
## :octicons-stack-24: Overview
3+
## Overview
44

55
Kyverno is a policy engine designed for Kubernetes that validates, mutates, and generates configurations using policies as Kubernetes resources. It provides key features like:
66

77
- Policy validation and enforcement
8-
- Resource mutation and generation
8+
- Resource mutation and generation
99
- Image verification and security controls
1010
- Audit logging and reporting
1111
- Admission control webhooks
@@ -15,7 +15,6 @@ The following policies are shipped by default in this platform to enforce securi
1515
For detailed information about Kyverno's capabilities, refer to the [official documentation](https://kyverno.io/docs/) or [policy library](https://kyverno.io/policies/).
1616

1717
---
18-
1918
## :material-shield-lock: Rule: deny-empty-ingress-host
2019

2120
**Category:** Best Practices | **Severity:** medium | **Scope:** Cluster-wide
@@ -79,6 +78,18 @@ A Kubernetes Service of type NodePort uses a host port to receive traffic from a
7978

8079
---
8180

81+
## :material-shield-lock: Rule: mutate-psa-labels
82+
83+
**Category:** Pod Security Admission, EKS Best Practices | **Severity:** medium | **Scope:** Cluster-wide
84+
85+
Pod Security Admission (PSA) can be controlled via the assignment of labels at the Namespace level which define the Pod Security Standard (PSS) profile in use and the action to take. If not using a cluster-wide configuration via an AdmissionConfiguration file, Namespaces must be explicitly labeled. This policy assigns the labels `pod-security.kubernetes.io/enforce=baseline` and `pod-security.kubernetes.io/warn=restricted` to all new Namespaces if those labels are not included.
86+
87+
**Rules**
88+
89+
- **add-psa-labels** (Mutation)
90+
91+
---
92+
8293
## :material-shield-lock: Rule: deny-default-namespace
8394

8495
**Category:** Multi-Tenancy | **Severity:** medium | **Scope:** Cluster-wide
@@ -131,4 +142,4 @@ Capabilities permit privileged actions without giving full root access. The CAP_
131142

132143
---
133144

134-
**Total Policies: 9**
145+
**Total Policies: 10**

0 commit comments

Comments
 (0)