| copyright | lastupdated | ||
|---|---|---|---|
|
2020-04-03 |
An Red Hat Advanced Cluster Management for Kubernetes template is defined within a policy document. Each policy document can have at least one or multiple templates.
Important: Each client and cloud provider is responsible for ensuring that their managed cloud environment meets internal enterprise security standards for software engineering, secure engineering, resiliency, security, and regulatory compliance for workloads hosted on Kubernetes clusters. Use the governance and security capability to gain visibility and remediate configurations to meet standards.
Each policy within the policy document contains the following elements:
-
An
annotationsparameter is used to specify a set of security details that describes the set of standards the policy is trying to validate. View the following descriptions of the security policy annotations:-
policy.mcm.ibm.com/standards- The name or names of security standards the policy is related to. For example, National Institute of Standards and Technology (NIST) and Payment Card Industry (PCI). -
policy.mcm.ibm.com/categories- The security control category the policy applies to. For example, Access Control, System and Information Integrity. -
policy.mcm.ibm.com/controls- The name of the security control that is being checked. For example, Center of Internet Security (CIS) and certificate policy controller.Notes:
- Parameter values for
standard, categories, and controlsare not required. The parameter value is empty when the values are not defined. - Use your internal security standards or industry standards for the
annotationsfield. You can view policy violations based on the standards and categories that you define for your policy on the Policies page, from the console.
- Parameter values for
-
-
A
namespaceselector that specifies which namespaces within the hub cluster that the policy is applied to. -
A list of
templates, such asrole-templates,object-templates, andpolicy-templateswithin the policy that describes how a resource in Kubernetes might be defined, and whether it is allowed to exist.-
A
role-templateis used to list RBAC roles that must be evaluated or applied to the managed clusters. Role templates are treated as a special category of templates, as they have rules inside that can be analyzed and compared to evaluate the compliance of a cluster. -
An
object-templateis used to list any other Kubernetes object that must be evaluated or applied to the managed clusters. An example of object can be a pod security policy, an image policy, or a limit range. -
A
policy-templateis used to create one or more policies for third party or external security controls. For example, you can create a certificate expiration policy with the certificate policy controller.
Create custom policy controllers to validate the compliance of your policies. For more information about other policy controllers, see Red Hat Advanced Cluster Management for Kubernetes policy controllers.
-
See Red Hat Advanced Cluster Management for Kubernetes Governance and risk for more policy topics.