Skip to content

Create default k8s security policy for Turbinia #116

@wajihyassine

Description

@wajihyassine

Name and Version

charts/turbinia

What is the problem this feature will solve?

Improves the security of the deployment / underlying containers

What is the feature you are proposing to solve the problem?

Configure and test a set of security policies for the Turbinia deployment.

This can include:

securityContext:
  readOnlyRootFilesystem: true
  runAsNonRoot: true
  allowPrivilegeEscalation: false
  runAsUser: <USER ID MAPPED IN CONTAINER>

Also by enabling the default seccomp profile: https://kubernetes.io/docs/tutorials/security/seccomp/

More guidance can be found here: https://kubernetes.io/docs/concepts/security/pod-security-standards/

The Turbinia Worker may also need to stay as privileged given the need of accessing the underlying raw disk attached to a given node/machine.

What alternatives have you considered?

No response

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions