Skip to content

Latest commit

 

History

History
41 lines (24 loc) · 3.32 KB

File metadata and controls

41 lines (24 loc) · 3.32 KB
copyright lastupdated
years
2020
2020-04-03

Red Hat Advanced Cluster Management for Kubernetes policy overview

An Red Hat Advanced Cluster Management for Kubernetes template is defined within a policy document. Each policy document can have at least one or multiple templates.

Important: Each client and cloud provider is responsible for ensuring that their managed cloud environment meets internal enterprise security standards for software engineering, secure engineering, resiliency, security, and regulatory compliance for workloads hosted on Kubernetes clusters. Use the governance and security capability to gain visibility and remediate configurations to meet standards.

Policy elements

Each policy within the policy document contains the following elements:

  • An annotations parameter is used to specify a set of security details that describes the set of standards the policy is trying to validate. View the following descriptions of the security policy annotations:

    • policy.mcm.ibm.com/standards - The name or names of security standards the policy is related to. For example, National Institute of Standards and Technology (NIST) and Payment Card Industry (PCI).

    • policy.mcm.ibm.com/categories - The security control category the policy applies to. For example, Access Control, System and Information Integrity.

    • policy.mcm.ibm.com/controls - The name of the security control that is being checked. For example, Center of Internet Security (CIS) and certificate policy controller.

      Notes:

      • Parameter values for standard, categories, and controls are not required. The parameter value is empty when the values are not defined.
      • Use your internal security standards or industry standards for the annotations field. You can view policy violations based on the standards and categories that you define for your policy on the Policies page, from the console.
  • A namespace selector that specifies which namespaces within the hub cluster that the policy is applied to.

  • A list of templates, such as role-templates, object-templates, and policy-templates within the policy that describes how a resource in Kubernetes might be defined, and whether it is allowed to exist.

    • A role-template is used to list RBAC roles that must be evaluated or applied to the managed clusters. Role templates are treated as a special category of templates, as they have rules inside that can be analyzed and compared to evaluate the compliance of a cluster.

    • An object-template is used to list any other Kubernetes object that must be evaluated or applied to the managed clusters. An example of object can be a pod security policy, an image policy, or a limit range.

    • A policy-template is used to create one or more policies for third party or external security controls. For example, you can create a certificate expiration policy with the certificate policy controller.

    Create custom policy controllers to validate the compliance of your policies. For more information about other policy controllers, see Red Hat Advanced Cluster Management for Kubernetes policy controllers.

See Red Hat Advanced Cluster Management for Kubernetes Governance and risk for more policy topics.