instruction
stringlengths
172
6.32k
output
stringlengths
88
4.06k
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/false'. '/sbin/nologin'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /bin/false - path: /sbin/nologin action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path ' /var/log/nginx/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /var/log/nginx/ ownerOnly: true recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/home/user1/secret_data*' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPatterns: - pattern: /home/user1/secret_data* ownerOnly: true readOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the network-related policies. In this case, rule applies to ICMP network traffic. Specifies what to do when rules match, which means relevant network activities will be logged.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 network: matchProtocols: - protocol: icmp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /usr/bin/apt - path: /usr/bin/apt-get action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/shm/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /dev/shm/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /dev/ readOnly: true recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/**/*clockwork/**' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPatterns: - pattern: /**/*clockwork/** action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /usr/bin/apt - path: /usr/bin/apt-get action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/shadow'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPaths: - path: /etc/shadow action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/bin/kubectl'. '/usr/bin/kubectl'. '/usr/local/bin/docker'. '/usr/bin/docker'. '/usr/local/bin/crictl'. '/usr/bin/crictl'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /usr/local/bin/kubectl - path: /usr/bin/kubectl - path: /usr/local/bin/docker - path: /usr/bin/docker - path: /usr/local/bin/crictl - path: /usr/bin/crictl action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchDirectories: - dir: /sbin/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. '/bin/apt-get'. '/sbin/apk'. '/bin/apt'. '/usr/bin/dpkg'. '/bin/dpkg'. '/usr/bin/gdebi'. '/bin/gdebi'. '/usr/bin/make'. '/bin/make'. '/usr/bin/yum'. '/bin/yum'. '/usr/bin/rpm'. '/bin/rpm'. '/usr/bin/dnf'. '/bin/dnf'. '/usr/bin/pacman'. '/usr/sbin/pacman'. '/bin/pacman'. '/sbin/pacman'. '/usr/bin/makepkg'. '/usr/sbin/makepkg'. '/bin/makepkg'. '/sbin/makepkg'. '/usr/bin/yaourt'. '/usr/sbin/yaourt'. '/bin/yaourt'. '/sbin/yaourt'. '/usr/bin/zypper'. '/bin/zypper'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /usr/bin/apt - path: /usr/bin/apt-get - path: /bin/apt-get - path: /sbin/apk - path: /bin/apt - path: /usr/bin/dpkg - path: /bin/dpkg - path: /usr/bin/gdebi - path: /bin/gdebi - path: /usr/bin/make - path: /bin/make - path: /usr/bin/yum - path: /bin/yum - path: /usr/bin/rpm - path: /bin/rpm - path: /usr/bin/dnf - path: /bin/dnf - path: /usr/bin/pacman - path: /usr/sbin/pacman - path: /bin/pacman - path: /sbin/pacman - path: /usr/bin/makepkg - path: /usr/sbin/makepkg - path: /bin/makepkg - path: /sbin/makepkg - path: /usr/bin/yaourt - path: /usr/sbin/yaourt - path: /bin/yaourt - path: /sbin/yaourt - path: /usr/bin/zypper - path: /bin/zypper action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/bash'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /bin/bash ownerOnly: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/root/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/home/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/etc/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chsh'. '/bin/chmod'. '/bin/chown'. '/bin/chgrp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /usr/bin/chsh - path: /bin/chmod - path: /bin/chown - path: /bin/chgrp file: matchDirectories: - dir: /bin/ fromSource: - path: /bin/rm - dir: /root/ fromSource: - path: /bin/rm - dir: /home/ fromSource: - path: /bin/rm - dir: /etc/ fromSource: - path: /bin/rm action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/cassandra/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/storage/log/vcops/log/cassandra/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /var/log/cassandra/ recursive: true ownerOnly: true - dir: /storage/log/vcops/log/cassandra/ recursive: true ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/elasticsearch/',
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /var/log/elasticsearch/ action: audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/go/src/math/big'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPaths: - path: /usr/local/go/src/math/big action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/go/src/cmd/go/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /usr/local/go/src/cmd/go/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/share/zoneinfo/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/timedatectl'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/timezone'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/systemd-timesyncd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /usr/share/zoneinfo/ readOnly: true ownerOnly: true process: matchPaths: - path: /usr/bin/timedatectl ownerOnly: true - path: /etc/timezone ownerOnly: true - path: /usr/lib/systemd/systemd-timesyncd ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/init/control-alt-delete.conf'. '/etc/init/control-alt-delete.override'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPaths: - path: /etc/init/control-alt-delete.conf - path: /etc/init/control-alt-delete.override action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/ssl/certs/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/etc/ssl/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /etc/ssl/certs/ recursive: true ownerOnly: true - dir: /etc/ssl/ recursive: true ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/*.shosts'. applies the rule to files with the '/**/*.shosts' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPaths: - path: /*.shosts matchPatterns: - pattern: /**/*.shosts action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/**/*ghostdog.sh' pattern, '/*ghostdog.sh' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/bin/sh'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPatterns: - pattern: /**/*ghostdog.sh - pattern: /*ghostdog.sh process: matchPaths: - path: /usr/bin/chmod - path: /bin/sh action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/sudoers'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/passwd'. '/etc/shadow'. '/root/.bashrc'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPaths: - path: /etc/sudoers readOnly: true - path: /etc/passwd - path: /etc/shadow - path: /root/.bashrc matchDirectories: - dir: /var/log/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/**/usr/local/tomcat/groovy' pattern, Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/lib/groovy-2.3.9.jar'. '/usr/local/tomcat/groovy.session'. '/usr/local/tomcat/bin/catalina.sh'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/tmp/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPatterns: - pattern: /**/usr/local/tomcat/groovy matchPaths: - path: /usr/local/tomcat/lib/groovy-2.3.9.jar - path: /usr/local/tomcat/groovy.session - path: /usr/local/tomcat/bin/catalina.sh matchDirectories: - dir: /tmp/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/**/WEB-INF/**/*.*' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPatterns: - pattern: /**/WEB-INF/**/*.* action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/lib/python2.7/dist-packages/pwnlib/shellcraft/templates/amd64/linux/syscalls/mprotect.asm'. '/usr/local/go/src/unsafe/unsafe.go'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/lib/python2.7/dist-packages/pwnlib/', specifies a rule that matches a specific directory path '/usr/lib/go-1.10/pkg/', specifies a rule that matches a specific directory path '/usr/lib/python3/dist-packages/', specifies a rule that matches a specific directory path '/usr/local/go/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/readlink'. '/usr/local/go/src/unsafe/unsafe.go'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /usr/bin/readlink - path: /usr/local/go/src/unsafe/unsafe.go file: matchPaths: - path: /usr/local/lib/python2.7/dist-packages/pwnlib/shellcraft/templates/amd64/linux/syscalls/mprotect.asm - path: /usr/local/go/src/unsafe/unsafe.go matchDirectories: - dir: /usr/local/lib/python2.7/dist-packages/pwnlib/ - dir: /usr/lib/go-1.10/pkg/ - dir: /usr/lib/python3/dist-packages/ - dir: /usr/local/go/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/conf/defaults.ini'. '/conf/grafana.ini'. '/etc/grafana/grafana.ini'. '/etc/grafana/defaults.ini'. '/etc/passwd'. '/etc/shadow'. '/home/grafana/.bash_history'. '/home/grafana/.ssh/id_rsa'. '/root/.bash_history'. '/root/.ssh/id_rsa'. '/usr/local/etc/grafana/grafana.ini'. '/var/lib/grafana/grafana.db'. applies the rule to files with the '/**/public/plugins/alertlist/etc/passwd' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/proc/net/fib_trie'. '/proc/net/tcp'. '/proc/self/cmdline'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPaths: - path: /conf/defaults.ini - path: /conf/grafana.ini - path: /etc/grafana/grafana.ini - path: /etc/grafana/defaults.ini - path: /etc/passwd - path: /etc/shadow - path: /home/grafana/.bash_history - path: /home/grafana/.ssh/id_rsa - path: /root/.bash_history - path: /root/.ssh/id_rsa - path: /usr/local/etc/grafana/grafana.ini - path: /var/lib/grafana/grafana.db matchPatterns: - pattern: /**/public/plugins/alertlist/etc/passwd process: matchPaths: - path: /proc/net/fib_trie - path: /proc/net/tcp - path: /proc/self/cmdline action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/shadow'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPaths: - path: /etc/passwd - path: /etc/shadow action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/root/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/nc'. '/usr/bin/dig'. '/usr/bin/ncat'. '/usr/bin/nmap'. '/usr/sbin/tcpdump'. '/usr/bin/tcpdump'. '/usr/bin/tshark'. '/usr/bin/ngrep'. '/usr/bin/telnet'. '/usr/bin/mitmproxy'. '/usr/bin/socat'. '/usr/sbin/zmap'. '/usr/bin/login'. '/usr/bin/su'. '/usr/sbin/nologin'. '/usr/bin/faillog'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/shadowconfig'. '/usr/sbin/grpck'. '/usr/sbin/pwunconv'. '/usr/sbin/grpconv'. '/usr/sbin/pwck'. '/usr/sbin/groupmod'. '/usr/sbin/vipw'. '/usr/sbin/pwconv'. '/usr/sbin/useradd'. '/usr/sbin/newusers'. '/usr/sbin/cppw'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/grpunconv'. '/usr/sbin/chgpasswd'. '/usr/sbin/userdel'. '/usr/bin/chage'. '/usr/bin/chsh'. '/usr/bin/gpasswd'. '/usr/bin/chfn'. '/usr/bin/expiry'. '/usr/bin/passwd'. '/usr/sbin/vigr'. '/usr/sbin/cpgr'. '/usr/sbin/adduser'. '/usr/sbin/addgroup'. '/usr/sbin/deluser'. '/usr/sbin/delgroup'. '/usr/bin/chage'. '/usr/bin/gpasswd'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/adduser'. '/usr/sbin/deluser'. '/usr/sbin/chpasswd'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/addgroup'. '/usr/sbin/delgroup'. '/usr/sbin/groupmems'. '/usr/sbin/groupmod'. '/usr/sbin/grpck'. '/usr/sbin/grpconv'. '/usr/sbin/grpunconv'. '/usr/sbin/newusers'. '/usr/sbin/pwck'. '/usr/sbin/pwconv'. '/usr/sbin/pwunconv'. '/usr/sbin/useradd'. '/usr/sbin/userdel'. '/usr/sbin/usermod'. '/usr/sbin/vigr'. '/usr/sbin/vipw'. '/usr/sbin/unix_chkpwd'. '/usr/bin/openssl'. '/usr/sbin/update-ca-certificates'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /usr/bin/chmod - path: /usr/bin/nc - path: /usr/bin/dig - path: /usr/bin/ncat - path: /usr/bin/nmap - path: /usr/sbin/tcpdump - path: /usr/bin/tcpdump - path: /usr/bin/tshark - path: /usr/bin/ngrep - path: /usr/bin/telnet - path: /usr/bin/mitmproxy - path: /usr/bin/socat - path: /usr/sbin/zmap - path: /usr/bin/login - path: /usr/bin/su - path: /usr/sbin/nologin - path: /usr/bin/faillog - path: /usr/bin/lastlog - path: /usr/bin/newgrp - path: /usr/bin/sg - path: /usr/sbin/shadowconfig - path: /usr/sbin/grpck - path: /usr/sbin/pwunconv - path: /usr/sbin/grpconv - path: /usr/sbin/pwck - path: /usr/sbin/groupmod - path: /usr/sbin/vipw - path: /usr/sbin/pwconv - path: /usr/sbin/useradd - path: /usr/sbin/newusers - path: /usr/sbin/cppw - path: /usr/sbin/chpasswd - path: /usr/sbin/usermod - path: /usr/sbin/groupadd - path: /usr/sbin/groupdel - path: /usr/sbin/grpunconv - path: /usr/sbin/chgpasswd - path: /usr/sbin/userdel - path: /usr/bin/chage - path: /usr/bin/chsh - path: /usr/bin/gpasswd - path: /usr/bin/chfn - path: /usr/bin/expiry - path: /usr/bin/passwd - path: /usr/sbin/vigr - path: /usr/sbin/cpgr - path: /usr/sbin/adduser - path: /usr/sbin/addgroup - path: /usr/sbin/deluser - path: /usr/sbin/delgroup - path: /usr/bin/chage - path: /usr/bin/gpasswd - path: /usr/bin/lastlog - path: /usr/bin/newgrp - path: /usr/bin/sg - path: /usr/sbin/adduser - path: /usr/sbin/deluser - path: /usr/sbin/chpasswd - path: /usr/sbin/groupadd - path: /usr/sbin/groupdel - path: /usr/sbin/addgroup - path: /usr/sbin/delgroup - path: /usr/sbin/groupmems - path: /usr/sbin/groupmod - path: /usr/sbin/grpck - path: /usr/sbin/grpconv - path: /usr/sbin/grpunconv - path: /usr/sbin/newusers - path: /usr/sbin/pwck - path: /usr/sbin/pwconv - path: /usr/sbin/pwunconv - path: /usr/sbin/useradd - path: /usr/sbin/userdel - path: /usr/sbin/usermod - path: /usr/sbin/vigr - path: /usr/sbin/vipw - path: /usr/sbin/unix_chkpwd - path: /usr/bin/openssl - path: /usr/sbin/update-ca-certificates file: matchDirectories: - dir: /dev/ recursive: true - dir: /root/ recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/touch', specifies a rule that matches a specific directory path '/bin/touch', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /dev/ recursive: true fromSource: - path: /usr/bin/touch - path: /bin/touch action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. applies the rule to files with the '/etc/*hado?' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPatterns: - pattern: /etc/*hado? action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_history'. '/dev/tty'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 - WARNING process: matchDirectories: - dir: /bin/ file: matchPaths: - path: /root/.bashrc - path: /root/.bash_history - path: /dev/tty matchDirectories: - dir: /credentials/ readOnly: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 - WARNING file: matchDirectories: - dir: /credentials/ readOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/home/user1/hello'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /home/user1/hello ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchDirectories: - dir: /credentials/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies a rule that matches a specific file absolute path '/secret.txt'. '/credentials/password'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 file: matchPaths: - path: /etc/passwd readOnly: true fromSource: - path: /bin/cat - path: /secret.txt - path: /credentials/password readOnly: true fromSource: - path: /bin/cat action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /usr/bin/apt - path: /usr/bin/apt-get action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/bin/kubectl'. '/usr/bin/kubectl'. '/usr/local/bin/docker'. '/usr/bin/docker'. '/usr/local/bin/crictl'. '/usr/bin/crictl'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /usr/local/bin/kubectl - path: /usr/bin/kubectl - path: /usr/local/bin/docker - path: /usr/bin/docker - path: /usr/local/bin/crictl - path: /usr/bin/crictl action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/sbin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchDirectories: - dir: /sbin/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/chown'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchPaths: - path: /usr/bin/chmod - path: /usr/bin/chown action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'container: ubuntu-1'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/run/secrets/kubernetes.io/serviceaccount/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: container: ubuntu-1 process: matchDirectories: - dir: /run/secrets/kubernetes.io/serviceaccount/ recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/nginx/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/root/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchDirectories: - dir: /etc/nginx/ ownerOnly: true recursive: true - dir: /root/ ownerOnly: true recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*.mysql history' pattern. '/*.mysql_history' pattern. '/*.mysqlsh/history' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPatterns: - pattern: /*.mysql history - pattern: /*.mysql_history - pattern: /*.mysqlsh/history action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source Specifies a rule that matches a specific file absolute path '/usr/bin/shred'. '/usr/bin/rm'. '/bin/mv'. '/bin/rm'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/root/*_history'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/shred'. '/usr/bin/rm'. '/bin/rm'. '/bin/mv'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/home/*/*_history'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - fromSource: - path: /usr/bin/shred - path: /usr/bin/rm - path: /bin/mv - path: /bin/rm - path: /usr/bin/mv path: /root/*_history - fromSource: - path: /usr/bin/shred - path: /usr/bin/rm - path: /bin/rm - path: /bin/mv - path: /usr/bin/mv path: /home/*/*_history action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/shm/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchDirectories: - dir: /dev/shm/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/*_history'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/shred'. '/usr/bin/rm'. '/bin/mv'. '/bin/rm'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/home/*/*_history'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/shred'. '/usr/bin/rm'. '/bin/rm'. '/bin/mv'. '/usr/bin/mv'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /root/*_history - fromSource: - path: /usr/bin/shred - path: /usr/bin/rm - path: /bin/mv - path: /bin/rm - path: /usr/bin/mv - path: /home/*/*_history - fromSource: - path: /usr/bin/shred - path: /usr/bin/rm - path: /bin/rm - path: /bin/mv - path: /usr/bin/mv action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/shadow'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/proc/**/cmdline' pattern. '/proc/**/sched_debug' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /etc/passwd - path: /etc/shadow process: matchPatterns: - pattern: /proc/**/cmdline - pattern: /proc/**/sched_debug action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/bulk' pattern. '/**/*bulk' pattern. '/**/**/bulk' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPatterns: - pattern: /**/bulk - pattern: /**/*bulk - pattern: /**/**/bulk action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/fapolicyd/fapolicyd.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/fapolicyd/fapolicyd.rules'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /etc/fapolicyd/fapolicyd.conf ownerOnly: true - path: /etc/fapolicyd/fapolicyd.rules ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/fchmod' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPatterns: - pattern: /**/fchmod action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/cassandra/data/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/lib/cassandra/commitlog/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/lib/cassandra/saved_caches/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchDirectories: - dir: /var/lib/cassandra/data/ recursive: true - dir: /var/lib/cassandra/commitlog/ recursive: true - dir: /var/lib/cassandra/saved_caches/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. applies the rule to files with the '/**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar' pattern, '/**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar' pattern, '/**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar' pattern. '/**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar' pattern. '/**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPatterns: - pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar - pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar - pattern: /**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar process: matchPatterns: - pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3-atlassian-8.jar - pattern: /**/confluence/WEB-INF/lib/xwork-1.0.3.6.jar - pattern: /**/confluence/WEB-INF/lib/webwork-2.1.5-atlassian-3.jar action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/storage/innobase/handler/handler0alter.cc'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /storage/innobase/handler/handler0alter.cc action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/sql/field_conv.cc'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /sql/field_conv.cc action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/sql/item_cmpfunc.cc'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /sql/item_cmpfunc.cc action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/gdm/custom.conf'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /etc/gdm/custom.conf action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the 'dbus-daemon' pattern. 'justtryit' pattern. 'justrobot' pattern. 'justforfun' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. apply rules to the executable processes at paths '/dev/shm/kdmtmpflush'. ' /var/run/haldrund.pid'.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /dev/shm/kdmtmpflush - path: /var/run/haldrund.pid matchPatterns: - pattern: dbus-daemon - pattern: justtryit - pattern: justrobot - pattern: justforfun action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/sudoers'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/passwd'. '/etc/shadow'. '/root/.bashrc'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /etc/sudoers readOnly: true - path: /etc/passwd - path: /etc/shadow - path: /root/.bashrc matchDirectories: - dir: /var/log/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/pydoc'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/pydoc'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. applies the rule to processes with the '/usr/bin/pydoc*' pattern. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/pydoc*' pattern. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /usr/bin/pydoc ownerOnly: true - path: /bin/pydoc ownerOnly: true matchPatterns: - pattern: /usr/bin/pydoc* ownerOnly: true - pattern: /bin/pydoc* ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/hostname'. '/etc/hosts.allow'. '/etc/hosts'. '/etc/lsb-release'. '/etc/networks'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /etc/hostname - path: /etc/hosts.allow - path: /etc/hosts - path: /etc/lsb-release - path: /etc/networks action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/django-admin dbshell*' pattern. '/*/*/django-admin dbshell*' pattern. '/*/django-admin dbshell*' pattern. '/django-admin dbshell*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPatterns: - pattern: /*/*/*/django-admin dbshell* - pattern: /*/*/django-admin dbshell* - pattern: /*/django-admin dbshell* - pattern: /django-admin dbshell* action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/django-admin inspectdb*' pattern. '/*/*/django-admin inspectdb*' pattern. '/*/django-admin inspectdb*' pattern. '/django-admin inspectdb*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPatterns: - pattern: /*/*/*/django-admin inspectdb* - pattern: /*/*/django-admin inspectdb* - pattern: /*/django-admin inspectdb* - pattern: /django-admin inspectdb* action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. applies the rule to files with the '/**/public/plugins/alertlist/etc/passwd' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. Specifies a rule that matches a specific file absolute path '/conf/defaults.ini'. '/conf/grafana.ini'. '/etc/grafana/grafana.ini'. '/etc/grafana/defaults.ini'. '/etc/passwd'. '/etc/shadow'. '/home/grafana/.bash_history'. '/home/grafana/.ssh/id_rsa'. '/root/.bash_history'. '/root/.ssh/id_rsa'. '/usr/local/etc/grafana/grafana.ini'. '/var/lib/grafana/grafana.db'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/proc/net/fib_trie'. '/proc/net/tcp'. '/proc/self/cmdline'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /conf/defaults.ini - path: /conf/grafana.ini - path: /etc/grafana/grafana.ini - path: /etc/grafana/defaults.ini - path: /etc/passwd - path: /etc/shadow - path: /home/grafana/.bash_history - path: /home/grafana/.ssh/id_rsa - path: /root/.bash_history - path: /root/.ssh/id_rsa - path: /usr/local/etc/grafana/grafana.ini - path: /var/lib/grafana/grafana.db matchPatterns: - pattern: /**/public/plugins/alertlist/etc/passwd process: matchPaths: - path: /proc/net/fib_trie - path: /proc/net/tcp - path: /proc/self/cmdline action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/sleep'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /bin/sleep action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/groupdel'. '/usr/sbin/userdel'. '/usr/sbin/chgpasswd'. '/usr/sbin/groupmod0o'. '/usr/sbin/groupadd'. '/usr/sbin/newusers'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /usr/sbin/groupdel - path: /usr/sbin/userdel - path: /usr/sbin/chgpasswd - path: /usr/sbin/groupmod0o - path: /usr/sbin/groupadd - path: /usr/sbin/newusers - path: /usr/sbin/chpasswd - path: /usr/sbin/usermod action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mysql/my.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /etc/mysql/my.cnf ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/rm'. '/usr/bin/unlink'. '/usr/bin/rmdir'. applies the rule to processes with the '/**/rm' pattern. '/**/rmdir' pattern. '/**/unlink' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /usr/bin/rm - path: /usr/bin/unlink - path: /usr/bin/rmdir matchPatterns: - pattern: /**/rm - pattern: /**/rmdir - pattern: /**/unlink action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/insmod'. '/usr/sbin/modprobe'. '/usr/sbin/rmmod'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /usr/sbin/insmod - path: /usr/sbin/modprobe - path: /usr/sbin/rmmod action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/var/spool/cron/atjobs'. '/var/spool/cron/atspool'. '/proc/loadavg'. '/var/run/utmp'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /var/spool/cron/atjobs - path: /var/spool/cron/atspool - path: /proc/loadavg - path: /var/run/utmp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/log/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchDirectories: - dir: /var/log/ recursive: true readOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/*/nginx -s reload*' pattern. '/*/*/*/nginx -s reload*' pattern. '/*/*/nginx -s reload*' pattern. '/*/nginx -s reload*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPatterns: - pattern: /*/*/*/*/nginx -s reload* - pattern: /*/*/*/nginx -s reload* - pattern: /*/*/nginx -s reload* - pattern: /*/nginx -s reload* action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/*/nginx -s stop*' pattern. '/*/*/*/nginx -s stop*' pattern. '/*/*/nginx -s stop*' pattern. '/*/nginx -s stop*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPatterns: - pattern: /*/*/*/*/nginx -s stop* - pattern: /*/*/*/nginx -s stop* - pattern: /*/*/nginx -s stop* - pattern: /*/nginx -s stop* action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/my.cnf'. '/etc/profile'. '/etc/X11/xorg.conf'. '/etc/sudoers'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /etc/my.cnf - path: /etc/profile - path: /etc/X11/xorg.conf - path: /etc/sudoers action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/resolv.conf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/root/.ssh/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. applies the rule to files with the '/home/*/.ssh/**' pattern, Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/chmod'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/getfacl'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/setfacl'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /usr/bin/chmod ownerOnly: true - path: /bin/chmod ownerOnly: true - path: /usr/bin/getfacl ownerOnly: true - path: /usr/bin/setfacl ownerOnly: true file: matchPaths: - path: /etc/resolv.conf ownerOnly: true matchDirectories: - dir: /root/.ssh/ recursive: true matchPatterns: - pattern: /home/*/.ssh/** action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/audispd.log'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/audit/audit.rules'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/var/log/auth.log'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /var/log/audispd.log readOnly: true - path: /etc/audit/audit.rules readOnly: true - path: /var/log/auth.log readOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/wget'. '/usr/bin/curl'. '/usr/bin/http'. '/usr/bin/shell'. '/usr/bin/zypp'. '/usr/bin/yum'. '/usr/bin/zypper'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /usr/bin/apt - path: /usr/bin/wget - path: /usr/bin/curl - path: /usr/bin/http - path: /usr/bin/shell - path: /usr/bin/zypp - path: /usr/bin/yum - path: /usr/bin/zypper ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/proc/bus/usb/'. '/media/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchDirectories: - dir: /proc/bus/usb/ - dir: /media/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/bin/md5sum'. '/dev/zero'. '/usr/bin/sha1sum'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/etc/systemd/system/*.service' pattern. '/etc/systemd/system/*.service.d/*CPUShares.conf' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPatterns: - pattern: /etc/systemd/system/*.service - pattern: /etc/systemd/system/*.service.d/*CPUShares.conf file: matchPaths: - path: /usr/bin/md5sum - path: /dev/zero - path: /usr/bin/sha1sum action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/adm/wtmp'. '/var/adm/pacct'. '/var/adm/sulog'. '/var/log/wtmp'. '/var/log/btmp'. '/var/run/utmp'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/dpkg'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /usr/bin/dpkg file: matchPaths: - path: /var/adm/wtmp - path: /var/adm/pacct - path: /var/adm/sulog - path: /var/log/wtmp - path: /var/log/btmp - path: /var/run/utmp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/apt-get install *' pattern. '/*/*/apt-get install *' pattern. '/*/apt install *' pattern. '/*/*/apt install *' pattern. '/*/apt install fwupd #new firmware installation' pattern. '/*/*/apt install fwupd' pattern. '/*/apt-get install fwupd' pattern. '/*/*/apt-get install fwupd' pattern. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPatterns: - pattern: /*/apt-get install * - pattern: /*/*/apt-get install * - pattern: /*/apt install * - pattern: /*/*/apt install * - pattern: /*/apt install fwupd #new firmware installation - pattern: /*/*/apt install fwupd - pattern: /*/apt-get install fwupd - pattern: /*/*/apt-get install fwupd matchDirectories: - dir: /dev/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/mysql/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchDirectories: - dir: /var/lib/mysql/mysql/ recursive: true readOnly: false action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/mysql.log'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/rm'. '/usr/bin/touch'. '/usr/bin/cat'. '/usr/bin/nano'. '/usr/bin/vi'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /var/log/mysql.log fromSource: - path: /usr/bin/rm - path: /usr/bin/touch - path: /usr/bin/cat - path: /usr/bin/nano - path: /usr/bin/vi action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/rc.local'. '/lib/systemd/system/rc-local.service'. '/lib/systemd/system/rc.service'. '/usr/lib/systemd/system/rc-local.service'. '/usr/lib/systemd/system/rc.service'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/lib/systemd/system/rc-local.service.d/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/lib/systemd/system/rc-local.service.d/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/etc/rc.local'. '/lib/systemd/system/rc-local.service'. '/lib/systemd/system/rc.service'. '/usr/lib/systemd/system/rc-local.service'. '/usr/lib/systemd/system/rc.service'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/lib/systemd/system/rc-local.service.d/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/lib/systemd/system/rc-local.service.d/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /etc/rc.local - path: /lib/systemd/system/rc-local.service - path: /lib/systemd/system/rc.service - path: /usr/lib/systemd/system/rc-local.service - path: /usr/lib/systemd/system/rc.service matchDirectories: - dir: /lib/systemd/system/rc-local.service.d/ recursive: true - dir: /usr/lib/systemd/system/rc-local.service.d/ recursive: true file: matchPaths: - path: /etc/rc.local - path: /lib/systemd/system/rc-local.service - path: /lib/systemd/system/rc.service - path: /usr/lib/systemd/system/rc-local.service - path: /usr/lib/systemd/system/rc.service matchDirectories: - dir: /lib/systemd/system/rc-local.service.d/ recursive: true readOnly: false - dir: /usr/lib/systemd/system/rc-local.service.d/ recursive: true readOnly: false action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/postgresql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/postgresql-common/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchDirectories: - dir: /etc/postgresql/ recursive: true readOnly: false - dir: /etc/postgresql-common/ recursive: true readOnly: false action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/lib/python3.10/site-packages/pygments/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/python -m pip install pygments*' pattern. '/*/*/python -m pip install pygments*' pattern. '/*/python -m pip install pygments*' pattern. '/*/*/*/pip install pygments*' pattern. '/*/*/pip install pygments*' pattern. '/*/pip install pygments*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPatterns: - pattern: /*/*/*/python -m pip install pygments* - pattern: /*/*/python -m pip install pygments* - pattern: /*/python -m pip install pygments* - pattern: /*/*/*/pip install pygments* - pattern: /*/*/pip install pygments* - pattern: /*/pip install pygments* file: matchDirectories: - dir: /usr/local/lib/python3.10/site-packages/pygments/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/scp'. '/usr/bin/sftp'. '/usr/bin/rsync'. '/usr/bin/ftp'. '/usr/bin/readlink'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /usr/bin/scp - path: /usr/bin/sftp - path: /usr/bin/rsync - path: /usr/bin/ftp - path: /usr/bin/readlink action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/postgresql/data/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/bin/rmdir', specifies a rule that matches a specific directory path '/bin/mv', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchDirectories: - dir: /var/lib/postgresql/data/ recursive: true readOnly: false fromSource: - path: /bin/rm - path: /bin/rmdir - path: /bin/mv action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_history'. '/home/user1/.profile'. '/home/user1/.bashrc'. '/run/utmp'. '/dev/tty'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/home/user1/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/proc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchDirectories: - dir: /bin/ recursive: true - dir: /usr/bin/ recursive: true file: matchPaths: - path: /root/.bashrc - path: /root/.bash_history - path: /home/user1/.profile - path: /home/user1/.bashrc - path: /run/utmp - path: /dev/tty matchDirectories: - dir: /home/user1/ ownerOnly: true - dir: /etc/ recursive: true - dir: /proc/ recursive: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/home/user1/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchDirectories: - dir: /home/user1/ ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/cat', Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat - WARNING file: matchDirectories: - dir: /credentials/ recursive: true fromSource: - path: /bin/cat action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/home/user1/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchDirectories: - dir: /home/user1/ recursive: true ownerOnly: true readOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_history'. '/home/user1/.profile'. '/home/user1/.bashrc'. '/run/utmp'. '/dev/tty'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/proc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/lib/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/sys/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/pts/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. apply rules to the executable processes at paths '/home/user1/hello'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchPaths: - path: /home/user1/hello ownerOnly: true matchDirectories: - dir: /bin/ recursive: true - dir: /usr/bin/ recursive: true file: matchPaths: - path: /root/.bashrc - path: /root/.bash_history - path: /home/user1/.profile - path: /home/user1/.bashrc - path: /run/utmp - path: /dev/tty matchDirectories: - dir: /etc/ recursive: true - dir: /proc/ recursive: true - dir: /lib/ recursive: true - dir: /sys/ recursive: true - dir: /pts/ recursive: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bashrc'. '/root/.bash_history'. '/dev/tty'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', specifies a rule that matches a specific directory path '/etc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/proc/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/bin/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat process: matchDirectories: - dir: /bin/ recursive: true - dir: /usr/bin/ recursive: true file: matchPaths: - path: /root/.bashrc - path: /root/.bash_history - path: /dev/tty matchDirectories: - dir: /credentials/ - dir: /etc/ recursive: true - dir: /proc/ recursive: true action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/credentials/password'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/readwrite'. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /credentials/password readOnly: true fromSource: - path: /readwrite action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/credentials/password'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/readwrite'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /credentials/password readOnly: true fromSource: - path: /readwrite action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: apache-tomcat'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/readwrite'. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: apache-tomcat file: matchPaths: - path: /home/user1/secret_data1.txt readOnly: true ownerOnly: true fromSource: - path: /readwrite action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/web.xml'. '/usr/local/tomcat/webapps.dist/ROOT/WEB-INF/web.xml'. '/usr/local/tomcat/webapps.dist/docs/WEB-INF/web.xml'. '/usr/local/tomcat/webapps.dist/docs/appdev/sample/web/WEB-INF/web.xml'. '/usr/local/tomcat/webapps.dist/examples/jsp/security/protected/error.jsp'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /usr/local/tomcat/conf/web.xml - path: /usr/local/tomcat/webapps.dist/ROOT/WEB-INF/web.xml - path: /usr/local/tomcat/webapps.dist/docs/WEB-INF/web.xml - path: /usr/local/tomcat/webapps.dist/docs/appdev/sample/web/WEB-INF/web.xml - path: /usr/local/tomcat/webapps.dist/examples/jsp/security/protected/error.jsp action: Audit

No dataset card yet

New: Create and edit this dataset card directly on the website!

Contribute a Dataset Card
Downloads last month
0
Add dataset card