UNCLASSIFIED - NO CUI

Skip to content
Snippets Groups Projects
Commit 2a04b13f authored by Micah Nagel's avatar Micah Nagel
Browse files

Twistlock Defenders: Kyverno Policy exception for run as non-root

parent 6779f4ee
No related branches found
No related tags found
1 merge request!1653Twistlock Defenders: Kyverno Policy exception for run as non-root
......@@ -182,7 +182,7 @@ policies:
require-non-root-group:
validationFailureAction: audit
{{- if $deployRestic }}
{{- if or $deployRestic .Values.twistlock.enabled }}
exclude:
any:
{{- if $deployRestic }}
......@@ -193,12 +193,23 @@ policies:
- velero
names:
- restic*
{{- end }}
{{- end }}
{{- if .Values.twistlock.enabled }}
# Twistlock Defenders run as root to perform real time scanning on the nodes/cluster, including:
# - read logs from `/var/log` to watch for malicious processes
# - audit modifications to `/etc/passwd` (watching for suspicious changes)
# - access the container runtime socket (observing all running containers on a node)
- resources:
namespaces:
- twistlock
names:
- twistlock-defender-ds*
{{- end }}
{{- end }}
require-non-root-user:
validationFailureAction: audit
{{- if $deployRestic }}
{{- if or $deployRestic .Values.twistlock.enabled }}
exclude:
any:
{{- if $deployRestic }}
......@@ -209,7 +220,19 @@ policies:
- velero
names:
- restic*
{{- end }}
{{- end }}
{{- if .Values.twistlock.enabled }}
# Twistlock Defenders run as root to perform real time scanning on the nodes/cluster, including:
# - read logs from `/var/log` to watch for malicious processes
# - audit modifications to `/etc/passwd` (watching for suspicious changes)
# - access the container runtime socket (observing all running containers on a node)
- resources:
namespaces:
- twistlock
names:
- twistlock-defender-ds*
{{- end }}
{{- end }}
{{- if .Values.twistlock.enabled }}
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment