diff --git a/content/en/docs/concepts/security/pod-security-standards.md b/content/en/docs/concepts/security/pod-security-standards.md index 1adf042c91..60cc021ae6 100644 --- a/content/en/docs/concepts/security/pod-security-standards.md +++ b/content/en/docs/concepts/security/pod-security-standards.md @@ -118,7 +118,7 @@ enforced/disallowed: On supported hosts, the `runtime/default` AppArmor profile is applied by default. The default policy should prevent overriding or disabling the policy, or restrict overrides to a whitelisted set of profiles.

Restricted Fields:
metadata.annotations['container.apparmor.security.beta.kubernetes.io/*']
-
Allowed Values: runtime/default, undefined
+
Allowed Values: 'runtime/default', undefined
@@ -132,6 +132,31 @@ enforced/disallowed:
Allowed Values: undefined/nil
+ + /proc Mount Type + + The default /proc masks are set up to reduce attack surface, and should be required.
+
Restricted Fields:
+ spec.containers[*].securityContext.procMount
+ spec.initContainers[*].securityContext.procMount
+
Allowed Values: undefined/nil, 'Default'
+ + + + Sysctls + + Sysctls can disable security mechanisms or affect all containers on a host, and should be disallowed except for a whitelisted "safe" subset. + A sysctl is considered safe if it is namespaced in the container or the pod, and it is isolated from other pods or processes on the same node.
+
Restricted Fields:
+ spec.securityContext.sysctls
+
Allowed Values:
+ kernel.shm_rmid_forced
+ net.ipv4.ip_local_port_range
+ net.ipv4.tcp_syncookies
+ net.ipv4.ping_group_range
+ undefined/empty
+ +