We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
charts/turbinia
Improves the security of the deployment / underlying containers
Configure and test a set of security policies for the Turbinia deployment.
This can include:
securityContext: readOnlyRootFilesystem: true runAsNonRoot: true allowPrivilegeEscalation: false runAsUser: <USER ID MAPPED IN CONTAINER>
Also by enabling the default seccomp profile: https://kubernetes.io/docs/tutorials/security/seccomp/
More guidance can be found here: https://kubernetes.io/docs/concepts/security/pod-security-standards/
The Turbinia Worker may also need to stay as privileged given the need of accessing the underlying raw disk attached to a given node/machine.
No response
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Name and Version
charts/turbinia
What is the problem this feature will solve?
Improves the security of the deployment / underlying containers
What is the feature you are proposing to solve the problem?
Configure and test a set of security policies for the Turbinia deployment.
This can include:
Also by enabling the default seccomp profile: https://kubernetes.io/docs/tutorials/security/seccomp/
More guidance can be found here: https://kubernetes.io/docs/concepts/security/pod-security-standards/
The Turbinia Worker may also need to stay as privileged given the need of accessing the underlying raw disk attached to a given node/machine.
What alternatives have you considered?
No response
The text was updated successfully, but these errors were encountered: