Create a PSP that will prevent the creation of privileged pods in the namespace.
Create a new PodSecurityPolicy named prevent-privileged-policy which prevents the creation of privileged pods.
Create a new ServiceAccount named psp-sa in the namespace default.
Create a new ClusterRole named prevent-role, which uses the newly created Pod Security Policy prevent-privileged-policy.
Create a new ClusterRoleBinding named prevent-role-binding, which binds the created ClusterRole prevent-role to the created SA psp-sa.
Also, Check the Configuration is working or not by trying to Create a Privileged pod, it should get failed.
A container image scanner is set up on the cluster.
Given an incomplete configuration in the directory
/etc/kubernetes/confcontrol and a functional container image scanner with HTTPS endpoint https://test-server.local.8081/image_policy
1. Enable the admission plugin.
2. Validate the control configuration and change it to implicit deny.
Finally, test the configuration by deploying the pod having the image tag as latest.
Context
A Role bound to a Pod's ServiceAccount grants overly permissive permissions. Complete the following tasks to reduce the set of permissions.
Task
Given an existing Pod named web-pod running in the namespace security.
Edit the existing Role bound to the Pod's ServiceAccount sa-dev-1 to only allow performing watch operations, only on resources of type services.
Create a new Role named role-2 in the namespace security, which only allows performing update
operations, only on resources of type namespaces.
Create a new RoleBinding named role-2-binding binding the newly created Role to the Pod's ServiceAccount.

Fix all issues via configuration and restart the affected components to ensure the new setting takes effect.
Fix all of the following violations that were found against theAPI server:-
a. Ensure the --authorization-mode argument includes RBAC
b. Ensure the --authorization-mode argument includes Node
c. Ensure that the --profiling argument is set to false
Fix all of the following violations that were found against theKubelet:-
a. Ensure the --anonymous-auth argument is set to false.
b. Ensure that the --authorization-mode argument is set to Webhook.
Fix all of the following violations that were found against theETCD:-
a. Ensure that the --auto-tls argument is not set to true
Hint: Take the use of Tool Kube-Bench







A container image scanner is set up on the cluster.
Given an incomplete configuration in the directory
/etc/kubernetes/confcontrol and a functional container image scanner with HTTPS endpoint https://test-server.local.8081/image_policy
1. Enable the admission plugin.
2. Validate the control configuration and change it to implicit deny.
Finally, test the configuration by deploying the pod having the image tag as latest.
Jose
3 days agoLawanda
12 days agoLemuel
19 days agoScarlet
27 days agoBeatriz
1 month agoCaprice
1 month agoErick
2 months agoMargo
2 months agoKrystal
2 months agoKanisha
2 months agoElouise
3 months agoAlecia
3 months agoTequila
3 months agoLouis
3 months agoGoldie
4 months agoGertude
4 months agoParis
4 months agoPrecious
4 months agoVeronika
5 months agoNana
5 months agoWeldon
5 months agoBroderick
5 months agoJeannetta
5 months agoFrankie
6 months agoLizette
6 months agoLottie
6 months agoFausto
8 months agoDeangelo
8 months agoNatalya
8 months agoOnita
9 months agoTamar
10 months agoMargery
10 months agoVallie
11 months agoTruman
11 months agoArminda
12 months agoSunshine
1 year agoFletcher
1 year agoAlease
1 year agoEleonore
1 year agoGeoffrey
1 year agoBarbra
1 year agoFrancoise
1 year agoDeane
1 year agoHermila
1 year agoBlossom
1 year agoFelix
1 year agoWilliam
1 year agoJolanda
1 year agoMicaela
1 year agoEladia
1 year agoSherita
1 year agoAdolph
1 year agoJanet
1 year agoMa
1 year agoCamellia
1 year agoTarra
1 year agoGlynda
1 year agoHassie
1 year agoJesus
1 year agoJulene
1 year agoLoren
1 year agoBillye
2 years agoNadine
2 years ago