@@ -9,17 +9,16 @@ doc-type: [howto]
9
9
doc-topic : [operator-manual, security]
10
10
---
11
11
12
- Kubewarden strives to be reasonable secure with little configuration, even
13
- acknowledging that security is a spectrum.
12
+ Kubewarden strives to be secure with little configuration.
14
13
In this section and its subpages you can find hardening tips (with their
15
14
trade-offs) to secure Kubewarden itself.
16
15
17
16
Please refer to our [ threat model] ( ../reference/threat-model ) for more information.
18
17
19
18
### ` kubewarden-defaults ` Helm chart
20
19
21
- Operators can obtain a reasonable secure deployment by installing all the
22
- Kubewarden Helm charts. Particularly, it is recommended to install the
20
+ Operators can obtain a secure deployment by installing all the
21
+ Kubewarden Helm charts. It's recommended to install the
23
22
` kubewarden-defaults ` Helm chart and enable its recommended policies with:
24
23
25
24
``` console
@@ -28,7 +27,7 @@ helm install --wait -n kubewarden kubewarden-defaults kubewarden/kubewarden-defa
28
27
--set recommendedPolicies.defaultPolicyMode=protect
29
28
```
30
29
31
- This provides a default PolicyServer and default policies in protect mode to
30
+ This provides a default PolicyServer and default policies, in protect mode, to
32
31
ensure the Kubewarden stack is safe from other workloads.
33
32
34
33
### Verifying Kubewarden artifacts
@@ -37,7 +36,7 @@ See the [Verifying Kubewarden](../tutorials/verifying-kubewarden) tutorial.
37
36
38
37
### RBAC
39
38
40
- The Kubewarden RBAC configurations are described in the different
39
+ Kubewarden describes RBAC configurations in different
41
40
_ Explanations_ sections. Users can fine-tune the needed permissions for the
42
41
[ Audit Scanner] ( ../explanations/audit-scanner#permissions-and-serviceaccounts )
43
42
feature, as well as [ per Policy Server] ( ../explanations/context-aware-policies )
@@ -51,32 +50,32 @@ kubectl get clusterroles,roles -A | grep kubewarden
51
50
52
51
### Per-policy permissions
53
52
54
- For context-aware policies, operators specify fine-graded permissions per
53
+ For context-aware policies, operators specify fine-grained permissions per
55
54
policy under its ` spec.contectAwareResources ` , and those work in conjuction
56
55
with the Service Account configured for the Policy Server where the policy
57
56
runs.
58
57
59
58
### Workload coverage
60
59
61
- By default, specific Namespaces are excluded from Kubewarden coverage. This is
60
+ By default, Kubewarden excludes specific Namespaces from Kubewarden coverage. This is
62
61
done to simplify first-time use and interoperability with other workloads.
63
62
64
63
Security-conscious operators can tune these Namespaces list via the
65
- ` .global.skipNamespaces ` Value for both the ` kubewarden-controller ` and
64
+ ` .global.skipNamespaces ` value for both the ` kubewarden-controller ` and
66
65
` kubewarden-defaults ` Helm charts.
67
66
68
67
### SecurityContexts
69
68
70
- Starting from 1.23, Kubewarden's stack is able to run inside of a Namespace
69
+ Starting from 1.23, Kubewarden's stack is able to run in a Namespace
71
70
where the [ restricted
72
71
Pod Security Standards] ( https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted )
73
- is enforced, with current Pod hardening best practices.
72
+ are enforced, with current Pod hardening best practices.
74
73
75
74
The ` kubewarden-controller ` Helm chart configures the SecurityContexts and
76
- exposes it in its ` values.yaml ` .
75
+ exposes them in its ` values.yaml ` .
77
76
78
77
The ` kubewarden-defaults ` Helm chart allows for configuing the default Policy
79
78
Server ` .spec.securityContexts ` under ` .Values.policyServer.securityContexts ` .
80
79
81
- For Policy Servers managed by operators, they can be configured via their
80
+ For Policy Servers managed by operators, you can configure them via their
82
81
[ ` spec.securityContexts ` ] ( https://docs.kubewarden.io/reference/CRDs#policyserversecurity ) .
0 commit comments