Policies in this folder are organized by NIST Special Publication 800-53. For more information, read NIST.SP.800-53r4.
View a list of policies that are organized by the security control catalog.
- Access Control
- Awareness and Training
- Audit and Accountability
- Security Assessment and Authorization
- Configuration Management
- Trusted Container policy: Use the trusted container policy to detect if running pods are using trusted images. For more information, see Trusted Container Policy Controller.
- Trusted Node policy: Use the trusted node policy to detect if there are untrusted/unattested nodes in the cluster. For more information, see Trusted Node Policy Controller.
- OPA Sample policy: Use the Open Policy Agent (OPA) Sample policy to view example of how an OPA policy can be created using ConfigMap. You can also view an example of adding a
REGO
script into a ConfigMap, which is evaluated by the OPA. For more information on this approach, see the example repository. Note: OPA must be installed to use the OPA ConfigMap policy. - Upgrade OpenShift-Cluster Sample policy: Use this Policy to upgrade an OpenShift-Cluster. The provided example is upgrading a 4.5 Cluster to version 4.5.3. Change the
channel
and thedesired version
if you want to upgrade other versions.
- Contingency Planning
- Identification and Authentication
- Incident Response
- Maintenance
- Media Protection
- Physical and Environmental Protection
- Planning
- Personnel Security
- Risk Assessment
- System and Services Acquisition
- System and Communications Protection
- System and Information Integrity
- Falco Cloud-Native runtime security -- Falco parses Linux system calls from the kernel at runtime, and asserts the stream against a powerful rules engine. If a rule is violated a Falco alert is triggered. See The Falco Project.
- Sysdig Agent -- Enforce Sysdig Agent deployment in all targeted clusters. The Sysdig Secure DevOps Platform converges security and compliance with performance and capacity monitoring to create a secure DevOps workflow. It uses the same data to monitor and secure, so you can correlate system activity with Kubernetes services. Check Sysdig and start a Free Trial.