-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update policy apparmor-psp-policy to target high level resources #22
Labels
Comments
19 tasks
jvanz
changed the title
apparmor-psp-policy
Update policy apparmor-psp-policy to target high level resources
Sep 23, 2022
jvanz
added
kind/enhancement
New feature or request
good first issue
Good for newcomers
labels
Oct 4, 2022
I am working on this |
assigning it to you! :) |
@geeksambhu are you still working on this? |
@geeksambhu I'm cleaning the assignees, to unblock this for other people. If you want to work on this, please raise your hand ). |
@viccuad, I will work on this. |
Reassigning then! Thanks! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Update the policy from targeting Pod resource to target higher level objects like deployments. This is a better practice because we prevent the resources to be created instead of failing in the deployment phase when the pods are created.
As an example, see kubewarden/allow-privilege-escalation-psp-policy#33.
The text was updated successfully, but these errors were encountered: