Skip to content

Commit 1089337

Browse files
viccuadjhkrug
andauthored
Apply suggestions from code review
Co-authored-by: John Krug <[email protected]> Signed-off-by: Víctor Cuadrado Juan <[email protected]>
1 parent 2afa215 commit 1089337

File tree

1 file changed

+12
-13
lines changed

1 file changed

+12
-13
lines changed

docs/howtos/security-hardening/security-hardening.md

+12-13
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,16 @@ doc-type: [howto]
99
doc-topic: [operator-manual, security]
1010
---
1111

12-
Kubewarden strives to be reasonable secure with little configuration, even
13-
acknowledging that security is a spectrum.
12+
Kubewarden strives to be secure with little configuration.
1413
In this section and its subpages you can find hardening tips (with their
1514
trade-offs) to secure Kubewarden itself.
1615

1716
Please refer to our [threat model](../reference/threat-model) for more information.
1817

1918
### `kubewarden-defaults` Helm chart
2019

21-
Operators can obtain a reasonable secure deployment by installing all the
22-
Kubewarden Helm charts. Particularly, it is recommended to install the
20+
Operators can obtain a secure deployment by installing all the
21+
Kubewarden Helm charts. It's recommended to install the
2322
`kubewarden-defaults` Helm chart and enable its recommended policies with:
2423

2524
```console
@@ -28,7 +27,7 @@ helm install --wait -n kubewarden kubewarden-defaults kubewarden/kubewarden-defa
2827
--set recommendedPolicies.defaultPolicyMode=protect
2928
```
3029

31-
This provides a default PolicyServer and default policies in protect mode to
30+
This provides a default PolicyServer and default policies, in protect mode, to
3231
ensure the Kubewarden stack is safe from other workloads.
3332

3433
### Verifying Kubewarden artifacts
@@ -37,7 +36,7 @@ See the [Verifying Kubewarden](../tutorials/verifying-kubewarden) tutorial.
3736

3837
### RBAC
3938

40-
The Kubewarden RBAC configurations are described in the different
39+
Kubewarden describes RBAC configurations in different
4140
_Explanations_ sections. Users can fine-tune the needed permissions for the
4241
[Audit Scanner](../explanations/audit-scanner#permissions-and-serviceaccounts)
4342
feature, as well as [per Policy Server](../explanations/context-aware-policies)
@@ -51,32 +50,32 @@ kubectl get clusterroles,roles -A | grep kubewarden
5150

5251
### Per-policy permissions
5352

54-
For context-aware policies, operators specify fine-graded permissions per
53+
For context-aware policies, operators specify fine-grained permissions per
5554
policy under its `spec.contectAwareResources`, and those work in conjuction
5655
with the Service Account configured for the Policy Server where the policy
5756
runs.
5857

5958
### Workload coverage
6059

61-
By default, specific Namespaces are excluded from Kubewarden coverage. This is
60+
By default, Kubewarden excludes specific Namespaces from Kubewarden coverage. This is
6261
done to simplify first-time use and interoperability with other workloads.
6362

6463
Security-conscious operators can tune these Namespaces list via the
65-
`.global.skipNamespaces` Value for both the `kubewarden-controller` and
64+
`.global.skipNamespaces` value for both the `kubewarden-controller` and
6665
`kubewarden-defaults` Helm charts.
6766

6867
### SecurityContexts
6968

70-
Starting from 1.23, Kubewarden's stack is able to run inside of a Namespace
69+
Starting from 1.23, Kubewarden's stack is able to run in a Namespace
7170
where the [restricted
7271
Pod Security Standards](https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted)
73-
is enforced, with current Pod hardening best practices.
72+
are enforced, with current Pod hardening best practices.
7473

7574
The `kubewarden-controller` Helm chart configures the SecurityContexts and
76-
exposes it in its `values.yaml`.
75+
exposes them in its `values.yaml`.
7776

7877
The `kubewarden-defaults` Helm chart allows for configuing the default Policy
7978
Server `.spec.securityContexts` under `.Values.policyServer.securityContexts`.
8079

81-
For Policy Servers managed by operators, they can be configured via their
80+
For Policy Servers managed by operators, you can configure them via their
8281
[`spec.securityContexts`](https://docs.kubewarden.io/reference/CRDs#policyserversecurity).

0 commit comments

Comments
 (0)