Skip to content

Commit

Permalink
Update audit level to Metadata for secrets
Browse files Browse the repository at this point in the history
Reflecting the changes in
falcosecurity/falco#1153, this changes the
recommended audit policy to log secrets information at Metadata level,
which prevents the contents of secrets from being logged.
  • Loading branch information
mstemm committed Apr 21, 2020
1 parent 874f7e4 commit ce70c84
Showing 1 changed file with 8 additions and 2 deletions.
10 changes: 8 additions & 2 deletions k8s_audit_config/audit-policy.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -56,11 +56,17 @@ rules:
# The empty string "" can be used to select non-namespaced resources.
namespaces: ["kube-system"]

# Log configmap and secret changes in all other namespaces at the RequestResponse level.
# Log configmap changes in all other namespaces at the RequestResponse level.
- level: RequestResponse
resources:
- group: "" # core API group
resources: ["secrets", "configmaps"]
resources: ["configmaps"]

# Log secret changes in all other namespaces at the Metadata level.
- level: Metadata
resources:
- group: "" # core API group
resources: ["secrets"]

# Log all other resources in core and extensions at the Request level.
- level: Request
Expand Down

0 comments on commit ce70c84

Please sign in to comment.