-
Notifications
You must be signed in to change notification settings - Fork 21
Open
Labels
enhancementNew feature or requestNew feature or requesthelp wantedExtra attention is neededExtra attention is neededturbinia
Description
Name and Version
charts/turbinia
What is the problem this feature will solve?
Improves the security of the deployment / underlying containers
What is the feature you are proposing to solve the problem?
Configure and test a set of security policies for the Turbinia deployment.
This can include:
securityContext:
readOnlyRootFilesystem: true
runAsNonRoot: true
allowPrivilegeEscalation: false
runAsUser: <USER ID MAPPED IN CONTAINER>
Also by enabling the default seccomp profile: https://kubernetes.io/docs/tutorials/security/seccomp/
More guidance can be found here: https://kubernetes.io/docs/concepts/security/pod-security-standards/
The Turbinia Worker may also need to stay as privileged given the need of accessing the underlying raw disk attached to a given node/machine.
What alternatives have you considered?
No response
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or requesthelp wantedExtra attention is neededExtra attention is neededturbinia