-
Notifications
You must be signed in to change notification settings - Fork 49
/
require-default-deny-network-policies.yaml
58 lines (58 loc) · 2.49 KB
/
require-default-deny-network-policies.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
# Copyright 2024 Google LLC
#
# This is “Software” that is licensed under the “General Software” section of
# the Service Specific Terms (https://cloud.google.com/terms/service-terms) for
# usage in accordance with the following “Scope of Use”: This file may only be
# used on an Anthos cluster, including any associated ci/cd use. “Anthos
# cluster” is defined as “A Cluster (of any kind) registered to a fleet project
# where the Anthos API is enabled”.
apiVersion: constraints.gatekeeper.sh/v1beta1
kind: K8sRequireDefaultDenyEgressPolicy
metadata:
name: pci-dss-v4.0-require-default-deny-network-policies
labels:
policycontroller.gke.io/bundleName: pci-dss-v4.0
annotations:
policycontroller.gke.io/bundleVersion: "202403.0"
policycontroller.gke.io/constraintData: |-
"{
bundleName: 'pci-dss-v4.0',
bundleDisplayName: 'PCI DSS v4.0',
bundleLink: 'https://cloud.google.com/anthos-config-management/docs/how-to/using-pci-dss-v4',
bundleVersion: '202403.0',
bundleDescription: 'Use the PCI DSS v4.0 policy bundle with Policy Controller to evaluate the compliance of your cluster resources against some aspects of the Payment Card Industry (PCI) Data Security Standard (DSS) v4.0.',
controlNumbers: '[1.3.2,1.4.4]',
severity: 'UNSPECIFIED',
description: 'Requires that every namespace defined in the cluster have a default deny NetworkPolicy for egress.',
remediation: 'Every namespace defined in the cluster requires a default deny NetworkPolicy for egress, please add the required NetworkPolicy. See "Network Policies" for more information: https://kubernetes.io/docs/concepts/services-networking/network-policies/',
minimumTemplateLibraryVersion: '1.14.0',
constraintHash: '5e99275370745e95ffe29ae2ab086eba404b9b20f14a545b541e4d181611710a'
}"
spec:
enforcementAction: dryrun
match:
excludedNamespaces:
- istio-system
- kube-system
- config-management-system
- resource-group-system
- gatekeeper-system
- kube-public
- gke-connect
- asm-system
- kube-node-lease
- config-management-monitoring
- capi-system
- vm-system
- gke-managed-metrics-server
- cert-manager
- anthos-creds
- anthos-identity-service
- capi-kubeadm-bootstrap-system
- gke-system
- gmp-system
- gmp-public
- gke-gmp-system
- gke-managed-filestorecsi
- gke-managed-system
- gke-managed-cim