-
Notifications
You must be signed in to change notification settings - Fork 49
/
proc-mount-type.yaml
40 lines (40 loc) · 1.91 KB
/
proc-mount-type.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
# Copyright 2024 Google LLC
#
# This is “Software” that is licensed under the “General Software” section of
# the Service Specific Terms (https://cloud.google.com/terms/service-terms) for
# usage in accordance with the following “Scope of Use”: This file may only be
# used on an Anthos cluster, including any associated ci/cd use. “Anthos
# cluster” is defined as “A Cluster (of any kind) registered to a fleet project
# where the Anthos API is enabled”.
apiVersion: constraints.gatekeeper.sh/v1beta1
kind: K8sPSPProcMount
metadata:
name: mitre-v2024-proc-mount-type
labels:
policycontroller.gke.io/bundleName: mitre-v2024
annotations:
policycontroller.gke.io/bundleVersion: 202402.0-preview
policycontroller.gke.io/constraintData: |-
"{
bundleName: 'mitre-v2024',
bundleDisplayName: 'MITRE',
bundleLink: 'https://cloud.google.com/anthos-config-management/docs/how-to/using-mitre-v2024',
bundleVersion: '202402.0-preview',
bundleDescription: 'Use the MITRE policy bundle with Policy Controller to evaluate the compliance of your cluster resources against some aspects of the MITRE knowledge base of adversary tactics and techniques based on real-world observations.',
controlNumbers: '[]',
severity: 'UNSPECIFIED',
description: 'The default `/proc` masks reduce attack surface, and are required. https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline',
remediation: 'Containers cannot run with a `procMount` set to a value other than `Default`. Remove `procMount` from your containers or set to `Default`.',
minimumTemplateLibraryVersion: '1.10.2',
constraintHash: '0f2eb71e04fe7cf09cc5fdf0768940d7156cfbd29d381864c52610ba098b0584'
}"
spec:
enforcementAction: dryrun
match:
kinds:
- apiGroups:
- ""
kinds:
- Pod
parameters:
procMount: Default