1.1.24 Ensure that the admission control plugin PodSecurityPolicy is set

Information

Reject creating pods that do not match Pod Security Policies.

Rationale:

A Pod Security Policy is a cluster-level resource that controls the actions that a pod can perform and what it has the ability to access. The 'PodSecurityPolicy' objects define a set of conditions that a pod must run with in order to be accepted into the system. Pod Security Policies are comprised of settings and strategies that control the security features a pod has access to and hence this must be used to control pod access permissions.

**Note:** When the PodSecurityPolicy admission plugin is in use, there needs to be at least one PodSecurityPolicy in place for ANY pods to be admitted. See section 1.7 for recommendations on PodSecurityPolicy settings.

Solution

Follow the documentation and create Pod Security Policy objects as per your environment. Then, edit the API server pod specification file '/etc/kubernetes/manifests/kube-apiserver.yaml' on the master node and set the '--enable-admission-plugins' parameter to a value that includes 'PodSecurityPolicy':

--enable-admission-plugins=...,PodSecurityPolicy,...

Then restart the API Server.

See Also

https://workbench.cisecurity.org/files/2421

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CSCv6|14

Plugin: Unix

Control ID: 5d68c6ad612a61272dd513dc94095aa03ecbe2d7566ac02c3033cab7580754fe