All Policies
Restrict Seccomp
The runtime default seccomp profile must be required, or only specific additional profiles should be allowed. This policy ensures that only the `runtime/default` is used as a `type`.
Policy Definition
/pod-security/restricted/restrict-seccomp/restrict-seccomp.yaml
1apiVersion: kyverno.io/v1
2kind: ClusterPolicy
3metadata:
4 name: restrict-seccomp
5 annotations:
6 policies.kyverno.io/title: Restrict Seccomp
7 policies.kyverno.io/category: Pod Security Standards (Restricted)
8 policies.kyverno.io/severity: medium
9 policies.kyverno.io/subject: Pod
10 policies.kyverno.io/description: >-
11 The runtime default seccomp profile must be required, or only specific
12 additional profiles should be allowed. This policy ensures that only the
13 `runtime/default` is used as a `type`.
14spec:
15 background: true
16 validationFailureAction: audit
17 rules:
18 - name: seccomp
19 match:
20 resources:
21 kinds:
22 - Pod
23 validate:
24 message: >-
25 Use of custom Seccomp profiles is disallowed. The fields
26 spec.securityContext.seccompProfile.type,
27 spec.containers[*].securityContext.seccompProfile.type, and
28 spec.initContainers[*].securityContext.seccompProfile.type
29 must be unset or set to `runtime/default`.
30 pattern:
31 spec:
32 =(securityContext):
33 =(seccompProfile):
34 =(type): "runtime/default"
35 =(initContainers):
36 - =(securityContext):
37 =(seccompProfile):
38 =(type): "runtime/default"
39 containers:
40 - =(securityContext):
41 =(seccompProfile):
42 =(type): "runtime/default"
43