instruction
stringlengths 172
6.32k
| output
stringlengths 88
4.06k
|
---|---|
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/root/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchDirectories:
- dir: /usr/local/tomcat/
ownerOnly: true
- dir: /root/
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/users.xml'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /usr/local/tomcat/conf/users.xml
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/jaspic-providers.xml'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /usr/local/tomcat/conf/jaspic-providers.xml
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/chown'. '/bin/chmod'. '/bin/chown'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/bin/chown
- path: /bin/chmod
- path: /bin/chown
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchDirectories:
- dir: /etc/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/sbin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/sbin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/bin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchDirectories:
- dir: /bin/
readOnly: true
recursive: true
- dir: /sbin/
readOnly: true
recursive: true
- dir: /usr/sbin/
readOnly: true
recursive: true
- dir: /usr/bin/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/asm'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/compile'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/link'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/local/go/pkg/tool/linux_amd64/asm
fromSource:
- path: /usr/local/go/bin/go
- path: /usr/local/go/pkg/tool/linux_amd64/compile
fromSource:
- path: /usr/local/go/bin/go
- path: /usr/local/go/pkg/tool/linux_amd64/link
fromSource:
- path: /usr/local/go/bin/go
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/root/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/home/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/etc/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chsh'. '/bin/chmod'. '/bin/chown'. '/bin/chgrp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/chsh
- path: /bin/chmod
- path: /bin/chown
- path: /bin/chgrp
file:
matchDirectories:
- dir: /bin/
fromSource:
- path: /bin/rm
- dir: /root/
fromSource:
- path: /bin/rm
- dir: /home/
fromSource:
- path: /bin/rm
- dir: /etc/
fromSource:
- path: /bin/rm
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/profile'. '/root/.bashrc'. '/root/.bash_login'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /etc/profile
- path: /root/.bashrc
- path: /root/.bash_login
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/go/src/math/big'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /usr/local/go/src/math/big
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/go/src/cmd/go/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchDirectories:
- dir: /usr/local/go/src/cmd/go/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/go/src/crypto/elliptic/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchDirectories:
- dir: /usr/local/go/src/crypto/elliptic/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/mysql*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPatterns:
- pattern: /**/mysql*
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/my.cnf' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /**/my.cnf
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/good'. '/usr/bin/good'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
process:
matchPaths:
- path: /bin/good
- path: /usr/bin/good
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/strings/ctype-simple.c'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /strings/ctype-simple.c
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/strings/ctype-latin1.c'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /strings/ctype-latin1.c
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/squid-reports/**' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /**/squid-reports/**
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mysql/my.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/mariadb.conf.d'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/conf.d'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/debian-start'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/debian.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/mariadb.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/mysqld.pid'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/tmp/mysql.sock'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/system/mysql.service'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/system/mysqld.service'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /etc/mysql/my.cnf
ownerOnly: true
- path: /etc/mysql/mariadb.conf.d
ownerOnly: true
- path: /etc/mysql/conf.d
ownerOnly: true
- path: /etc/mysql/debian-start
ownerOnly: true
- path: /etc/mysql/debian.cnf
ownerOnly: true
- path: /etc/mysql/mariadb.cnf
ownerOnly: true
- path: /mysqld.pid
ownerOnly: true
- path: /tmp/mysql.sock
ownerOnly: true
- path: /usr/lib/systemd/system/mysql.service
ownerOnly: true
- path: /usr/lib/systemd/system/mysqld.service
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchDirectories:
- dir: /etc/mysql/
recursive: true
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /etc/passwd
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/*.conf' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /**/*.conf
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/ua-parser.js' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /**/ua-parser.js
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/*ghostdog.sh' pattern, '/*ghostdog.sh' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/bin/sh'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /**/*ghostdog.sh
- pattern: /*ghostdog.sh
process:
matchPaths:
- path: /usr/bin/chmod
- path: /bin/sh
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/cassandra/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/chown', specifies a rule that matches a specific directory path '/usr/bin/chmod', specifies a rule that matches a specific directory path '/usr/bin/chgrp', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchDirectories:
- dir: /etc/cassandra/
recursive: true
readOnly: false
fromSource:
- path: /usr/bin/chown
- path: /usr/bin/chmod
- path: /usr/bin/chgrp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/bin/'. '/usr/local/bin/'. '/bin/'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/bin/mvn'. applies the rule to processes with the '/**/qtp*' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchDirectories:
- dir: /usr/bin/
- dir: /usr/local/bin/
- dir: /bin/
fromSource:
- path: /usr/bin/mvn
matchPatterns:
- pattern: /**/qtp*
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/usr/local/tomcat/groovy' pattern, Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/lib/groovy-2.3.9.jar'. '/usr/local/tomcat/groovy.session'. '/usr/local/tomcat/bin/catalina.sh'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/tmp/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /**/usr/local/tomcat/groovy
matchPaths:
- path: /usr/local/tomcat/lib/groovy-2.3.9.jar
- path: /usr/local/tomcat/groovy.session
- path: /usr/local/tomcat/bin/catalina.sh
matchDirectories:
- dir: /tmp/
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/shadow'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/src/server'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /etc/passwd
- path: /etc/shadow
fromSource:
- path: /src/server
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/WEB-INF/**/*.*' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /**/WEB-INF/**/*.*
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related Linux capabilities. apply the rule to the capability name 'sys_admin'. Specifies what to do when rules match, in this case, the 'Block' action blocks the matching capability behavior. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
capabilities:
matchCapabilities:
- capability: sys_admin
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/id'. '/usr/bin/groups'. '/usr/bin/net'. '/usr/bin/finger'. '/usr/bin/getent'. '/usr/bin/lslogins'. '/usr/bin/users'. '/usr/bin/w'. '/usr/bin/last'. '/usr/bin/lastlog'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/id
- path: /usr/bin/groups
- path: /usr/bin/net
- path: /usr/bin/finger
- path: /usr/bin/getent
- path: /usr/bin/lslogins
- path: /usr/bin/users
- path: /usr/bin/w
- path: /usr/bin/last
- path: /usr/bin/lastlog
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/ps'. '/usr/bin/ps'. '/usr/bin/pgrep'. '/usr/bin/top'. '/usr/bin/htop'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /bin/ps
- path: /usr/bin/ps
- path: /usr/bin/pgrep
- path: /usr/bin/top
- path: /usr/bin/htop
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/lib/python2.7/dist-packages/pwnlib/shellcraft/templates/amd64/linux/syscalls/mprotect.asm'. '/usr/local/go/src/unsafe/unsafe.go'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/lib/python2.7/dist-packages/pwnlib/', specifies a rule that matches a specific directory path '/usr/lib/go-1.10/pkg/', specifies a rule that matches a specific directory path '/usr/lib/python3/dist-packages/', specifies a rule that matches a specific directory path '/usr/local/go/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/readlink'. '/usr/local/go/src/unsafe/unsafe.go'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/readlink
- path: /usr/local/go/src/unsafe/unsafe.go
file:
matchPaths:
- path: /usr/local/lib/python2.7/dist-packages/pwnlib/shellcraft/templates/amd64/linux/syscalls/mprotect.asm
- path: /usr/local/go/src/unsafe/unsafe.go
matchDirectories:
- dir: /usr/local/lib/python2.7/dist-packages/pwnlib/
- dir: /usr/lib/go-1.10/pkg/
- dir: /usr/lib/python3/dist-packages/
- dir: /usr/local/go/
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/service.pwd' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /**/service.pwd
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/who'. '/usr/bin/w'. '/usr/bin/id'. '/usr/bin/whoami'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/who
- path: /usr/bin/w
- path: /usr/bin/id
- path: /usr/bin/whoami
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/rm'. '/usr/bin/unlink'. '/usr/bin/rmdir'. applies the rule to processes with the '/**/rm' pattern. '/**/rmdir' pattern. '/**/unlink' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/rm
- path: /usr/bin/unlink
- path: /usr/bin/rmdir
matchPatterns:
- pattern: /**/rm
- pattern: /**/rmdir
- pattern: /**/unlink
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/dev/bus/usb'. '/dev/fd0'. '/dev/fd1'. '/dev/scd0'. '/dev/scd0'. '/dev/sr0'. '/dev/sr1'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/dev/ttyUSB0'. '/dev/ttyUSB1'. '/dev/ttyACM0'. '/dev/ttyS0'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /dev/bus/usb
- path: /dev/fd0
- path: /dev/fd1
- path: /dev/scd0
- path: /dev/scd0
- path: /dev/sr0
- path: /dev/sr1
process:
matchPaths:
- path: /dev/ttyUSB0
- path: /dev/ttyUSB1
- path: /dev/ttyACM0
- path: /dev/ttyS0
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/cache/nginx/client_temp/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/sbin/nginx', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchDirectories:
- dir: /var/cache/nginx/client_temp/
fromSource:
- path: /usr/sbin/nginx
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/ssh'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/ssh'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/sudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/sudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/visudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/visudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/last'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/last'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/find'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/find'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/file'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/ss'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/ufw'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/iptables'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/passwd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/pwck'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/setfacl'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/getfacl'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/sestatus'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lshw'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lshw'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lscpu'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lscpu'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lsblk'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lsblk'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lsusb'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lsusb'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lspci'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lspci'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lsscsi'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lsscsi'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/hdparm'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/hdparm'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/fdisk'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/fdisk'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/dmidecode'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/dmidecode'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/wget'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/wget'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/ssh
ownerOnly: true
- path: /bin/ssh
ownerOnly: true
- path: /usr/bin/sudo
ownerOnly: true
- path: /bin/sudo
ownerOnly: true
- path: /usr/sbin/visudo
ownerOnly: true
- path: /sbin/visudo
ownerOnly: true
- path: /usr/bin/last
ownerOnly: true
- path: /bin/last
ownerOnly: true
- path: /usr/bin/find
ownerOnly: true
- path: /bin/find
ownerOnly: true
- path: /usr/bin/file
ownerOnly: true
- path: /usr/bin/ss
ownerOnly: true
- path: /usr/sbin/ufw
ownerOnly: true
- path: /usr/sbin/iptables
ownerOnly: true
- path: /usr/bin/passwd
ownerOnly: true
- path: /usr/sbin/pwck
ownerOnly: true
- path: /usr/bin/setfacl
ownerOnly: true
- path: /usr/bin/getfacl
ownerOnly: true
- path: /usr/sbin/sestatus
ownerOnly: true
- path: /usr/bin/lshw
ownerOnly: true
- path: /bin/lshw
ownerOnly: true
- path: /usr/bin/lscpu
ownerOnly: true
- path: /bin/lscpu
ownerOnly: true
- path: /usr/bin/lsblk
ownerOnly: true
- path: /bin/lsblk
ownerOnly: true
- path: /usr/bin/lsusb
ownerOnly: true
- path: /bin/lsusb
ownerOnly: true
- path: /usr/bin/lspci
ownerOnly: true
- path: /bin/lspci
ownerOnly: true
- path: /usr/bin/lsscsi
ownerOnly: true
- path: /bin/lsscsi
ownerOnly: true
- path: /usr/sbin/hdparm
ownerOnly: true
- path: /sbin/hdparm
ownerOnly: true
- path: /usr/sbin/fdisk
ownerOnly: true
- path: /sbin/fdisk
ownerOnly: true
- path: /usr/sbin/dmidecode
ownerOnly: true
- path: /sbin/dmidecode
ownerOnly: true
- path: /usr/bin/wget
ownerOnly: true
- path: /bin/wget
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/root/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/nc'. '/usr/bin/dig'. '/usr/bin/ncat'. '/usr/bin/nmap'. '/usr/sbin/tcpdump'. '/usr/bin/tcpdump'. '/usr/bin/tshark'. '/usr/bin/ngrep'. '/usr/bin/telnet'. '/usr/bin/mitmproxy'. '/usr/bin/socat'. '/usr/sbin/zmap'. '/usr/bin/login'. '/usr/bin/su'. '/usr/sbin/nologin'. '/usr/bin/faillog'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/shadowconfig'. '/usr/sbin/grpck'. '/usr/sbin/pwunconv'. '/usr/sbin/grpconv'. '/usr/sbin/pwck'. '/usr/sbin/groupmod'. '/usr/sbin/vipw'. '/usr/sbin/pwconv'. '/usr/sbin/useradd'. '/usr/sbin/newusers'. '/usr/sbin/cppw'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/grpunconv'. '/usr/sbin/chgpasswd'. '/usr/sbin/userdel'. '/usr/bin/chage'. '/usr/bin/chsh'. '/usr/bin/gpasswd'. '/usr/bin/chfn'. '/usr/bin/expiry'. '/usr/bin/passwd'. '/usr/sbin/vigr'. '/usr/sbin/cpgr'. '/usr/sbin/adduser'. '/usr/sbin/addgroup'. '/usr/sbin/deluser'. '/usr/sbin/delgroup'. '/usr/bin/chage'. '/usr/bin/gpasswd'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/adduser'. '/usr/sbin/deluser'. '/usr/sbin/chpasswd'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/addgroup'. '/usr/sbin/delgroup'. '/usr/sbin/groupmems'. '/usr/sbin/groupmod'. '/usr/sbin/grpck'. '/usr/sbin/grpconv'. '/usr/sbin/grpunconv'. '/usr/sbin/newusers'. '/usr/sbin/pwck'. '/usr/sbin/pwconv'. '/usr/sbin/pwunconv'. '/usr/sbin/useradd'. '/usr/sbin/userdel'. '/usr/sbin/usermod'. '/usr/sbin/vigr'. '/usr/sbin/vipw'. '/usr/sbin/unix_chkpwd'. '/usr/bin/openssl'. '/usr/sbin/update-ca-certificates'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/bin/nc
- path: /usr/bin/dig
- path: /usr/bin/ncat
- path: /usr/bin/nmap
- path: /usr/sbin/tcpdump
- path: /usr/bin/tcpdump
- path: /usr/bin/tshark
- path: /usr/bin/ngrep
- path: /usr/bin/telnet
- path: /usr/bin/mitmproxy
- path: /usr/bin/socat
- path: /usr/sbin/zmap
- path: /usr/bin/login
- path: /usr/bin/su
- path: /usr/sbin/nologin
- path: /usr/bin/faillog
- path: /usr/bin/lastlog
- path: /usr/bin/newgrp
- path: /usr/bin/sg
- path: /usr/sbin/shadowconfig
- path: /usr/sbin/grpck
- path: /usr/sbin/pwunconv
- path: /usr/sbin/grpconv
- path: /usr/sbin/pwck
- path: /usr/sbin/groupmod
- path: /usr/sbin/vipw
- path: /usr/sbin/pwconv
- path: /usr/sbin/useradd
- path: /usr/sbin/newusers
- path: /usr/sbin/cppw
- path: /usr/sbin/chpasswd
- path: /usr/sbin/usermod
- path: /usr/sbin/groupadd
- path: /usr/sbin/groupdel
- path: /usr/sbin/grpunconv
- path: /usr/sbin/chgpasswd
- path: /usr/sbin/userdel
- path: /usr/bin/chage
- path: /usr/bin/chsh
- path: /usr/bin/gpasswd
- path: /usr/bin/chfn
- path: /usr/bin/expiry
- path: /usr/bin/passwd
- path: /usr/sbin/vigr
- path: /usr/sbin/cpgr
- path: /usr/sbin/adduser
- path: /usr/sbin/addgroup
- path: /usr/sbin/deluser
- path: /usr/sbin/delgroup
- path: /usr/bin/chage
- path: /usr/bin/gpasswd
- path: /usr/bin/lastlog
- path: /usr/bin/newgrp
- path: /usr/bin/sg
- path: /usr/sbin/adduser
- path: /usr/sbin/deluser
- path: /usr/sbin/chpasswd
- path: /usr/sbin/groupadd
- path: /usr/sbin/groupdel
- path: /usr/sbin/addgroup
- path: /usr/sbin/delgroup
- path: /usr/sbin/groupmems
- path: /usr/sbin/groupmod
- path: /usr/sbin/grpck
- path: /usr/sbin/grpconv
- path: /usr/sbin/grpunconv
- path: /usr/sbin/newusers
- path: /usr/sbin/pwck
- path: /usr/sbin/pwconv
- path: /usr/sbin/pwunconv
- path: /usr/sbin/useradd
- path: /usr/sbin/userdel
- path: /usr/sbin/usermod
- path: /usr/sbin/vigr
- path: /usr/sbin/vipw
- path: /usr/sbin/unix_chkpwd
- path: /usr/bin/openssl
- path: /usr/sbin/update-ca-certificates
file:
matchDirectories:
- dir: /dev/
recursive: true
- dir: /root/
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', specifies a rule that matches a specific directory path '/root/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/nc'. '/usr/bin/dig'. '/usr/bin/ncat'. '/usr/bin/nmap'. '/usr/sbin/tcpdump'. '/usr/bin/tcpdump'. '/usr/bin/tshark'. '/usr/bin/ngrep'. '/usr/bin/telnet'. '/usr/bin/mitmproxy'. '/usr/bin/socat'. '/usr/sbin/zmap'. '/usr/bin/login'. '/usr/bin/su'. '/usr/sbin/nologin'. '/usr/bin/faillog'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/shadowconfig'. '/usr/sbin/grpck'. '/usr/sbin/pwunconv'. '/usr/sbin/grpconv'. '/usr/sbin/pwck'. '/usr/sbin/groupmod'. '/usr/sbin/vipw'. '/usr/sbin/pwconv'. '/usr/sbin/useradd'. '/usr/sbin/newusers'. '/usr/sbin/cppw'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/grpunconv'. '/usr/sbin/chgpasswd'. '/usr/sbin/userdel'. '/usr/bin/chage'. '/usr/bin/chsh'. '/usr/bin/gpasswd'. '/usr/bin/chfn'. '/usr/bin/expiry'. '/usr/bin/passwd'. '/usr/sbin/vigr'. '/usr/sbin/cpgr'. '/usr/sbin/adduser'. '/usr/sbin/addgroup'. '/usr/sbin/deluser'. '/usr/sbin/delgroup'. '/usr/bin/chage'. '/usr/bin/gpasswd'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/adduser'. '/usr/sbin/deluser'. '/usr/sbin/chpasswd'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/addgroup'. '/usr/sbin/delgroup'. '/usr/sbin/groupmems'. '/usr/sbin/groupmod'. '/usr/sbin/grpck'. '/usr/sbin/grpconv'. '/usr/sbin/grpunconv'. '/usr/sbin/newusers'. '/usr/sbin/pwck'. '/usr/sbin/pwconv'. '/usr/sbin/pwunconv'. '/usr/sbin/useradd'. '/usr/sbin/userdel'. '/usr/sbin/usermod'. '/usr/sbin/vigr'. '/usr/sbin/vipw'. '/usr/sbin/unix_chkpwd'. '/usr/bin/openssl'. '/usr/sbin/update-ca-certificates'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/bin/nc
- path: /usr/bin/dig
- path: /usr/bin/ncat
- path: /usr/bin/nmap
- path: /usr/sbin/tcpdump
- path: /usr/bin/tcpdump
- path: /usr/bin/tshark
- path: /usr/bin/ngrep
- path: /usr/bin/telnet
- path: /usr/bin/mitmproxy
- path: /usr/bin/socat
- path: /usr/sbin/zmap
- path: /usr/bin/login
- path: /usr/bin/su
- path: /usr/sbin/nologin
- path: /usr/bin/faillog
- path: /usr/bin/lastlog
- path: /usr/bin/newgrp
- path: /usr/bin/sg
- path: /usr/sbin/shadowconfig
- path: /usr/sbin/grpck
- path: /usr/sbin/pwunconv
- path: /usr/sbin/grpconv
- path: /usr/sbin/pwck
- path: /usr/sbin/groupmod
- path: /usr/sbin/vipw
- path: /usr/sbin/pwconv
- path: /usr/sbin/useradd
- path: /usr/sbin/newusers
- path: /usr/sbin/cppw
- path: /usr/sbin/chpasswd
- path: /usr/sbin/usermod
- path: /usr/sbin/groupadd
- path: /usr/sbin/groupdel
- path: /usr/sbin/grpunconv
- path: /usr/sbin/chgpasswd
- path: /usr/sbin/userdel
- path: /usr/bin/chage
- path: /usr/bin/chsh
- path: /usr/bin/gpasswd
- path: /usr/bin/chfn
- path: /usr/bin/expiry
- path: /usr/bin/passwd
- path: /usr/sbin/vigr
- path: /usr/sbin/cpgr
- path: /usr/sbin/adduser
- path: /usr/sbin/addgroup
- path: /usr/sbin/deluser
- path: /usr/sbin/delgroup
- path: /usr/bin/chage
- path: /usr/bin/gpasswd
- path: /usr/bin/lastlog
- path: /usr/bin/newgrp
- path: /usr/bin/sg
- path: /usr/sbin/adduser
- path: /usr/sbin/deluser
- path: /usr/sbin/chpasswd
- path: /usr/sbin/groupadd
- path: /usr/sbin/groupdel
- path: /usr/sbin/addgroup
- path: /usr/sbin/delgroup
- path: /usr/sbin/groupmems
- path: /usr/sbin/groupmod
- path: /usr/sbin/grpck
- path: /usr/sbin/grpconv
- path: /usr/sbin/grpunconv
- path: /usr/sbin/newusers
- path: /usr/sbin/pwck
- path: /usr/sbin/pwconv
- path: /usr/sbin/pwunconv
- path: /usr/sbin/useradd
- path: /usr/sbin/userdel
- path: /usr/sbin/usermod
- path: /usr/sbin/vigr
- path: /usr/sbin/vipw
- path: /usr/sbin/unix_chkpwd
- path: /usr/bin/openssl
- path: /usr/sbin/update-ca-certificates
file:
matchDirectories:
- dir: /dev/
- dir: /root/
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/auth.log'. '/var/log/daemon.log'. '/var/log/debug'. '/var/log/debug'. '/var/log/syslog'. '/var/log/faillog'. '/var/log/lastlog'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /var/log/auth.log
- path: /var/log/daemon.log
- path: /var/log/debug
- path: /var/log/debug
- path: /var/log/syslog
- path: /var/log/faillog
- path: /var/log/lastlog
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/.bash_profile' pattern, '/**/.bash_login' pattern, '/**/.profile' pattern, '/**/.bashrc' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. Specifies a rule that matches a specific file absolute path '/etc/profile'. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /etc/profile
matchPatterns:
- pattern: /**/.bash_profile
- pattern: /**/.bash_login
- pattern: /**/.profile
- pattern: /**/.bashrc
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the network-related policies. In this case, rule applies to UDP network traffic. Specifies what to do when rules match, which means relevant network activities will be logged. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
network:
matchProtocols:
- protocol: udp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/skel/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/sbin/useradd'. '/usr/bin/chown'. '/usr/sbin/userdel'. '/usr/bin/kill'. '/usr/sbin/usermod'. '/usr/bin/passwd'. '/usr/bin/chsh'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/sbin/useradd
- path: /usr/bin/chown
- path: /usr/sbin/userdel
- path: /usr/bin/kill
- path: /usr/sbin/usermod
- path: /usr/bin/passwd
- path: /usr/bin/chsh
file:
matchDirectories:
- dir: /etc/skel/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/local/bin/apt-get'. '/usr/bin/dpkg'. '/usr/bin/snap'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/local/bin/apt-get
- path: /usr/bin/dpkg
- path: /usr/bin/snap
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/snmp/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/mount'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /bin/mount
file:
matchPaths:
- path: /etc/passwd
readOnly: false
matchDirectories:
- dir: /etc/snmp/
recursive: true
readOnly: false
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/utmp'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /var/log/utmp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/mysql.log'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/rm'. '/usr/bin/touch'. '/usr/bin/cat'. '/usr/bin/nano'. '/usr/bin/vi'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /var/log/mysql.log
fromSource:
- path: /usr/bin/rm
- path: /usr/bin/touch
- path: /usr/bin/cat
- path: /usr/bin/nano
- path: /usr/bin/vi
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/ssh/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. Specifies a rule that matches a specific file absolute path '/var/log/wtmp'. '/var/run/utmp'. '/var/log/auth.log'. '/etc/passwd'. '/etc/shadow'. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /var/log/wtmp
- path: /var/run/utmp
- path: /var/log/auth.log
- path: /etc/passwd
- path: /etc/shadow
matchDirectories:
- dir: /etc/ssh/
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/rc.local'. '/lib/systemd/system/rc-local.service'. '/lib/systemd/system/rc.service'. '/usr/lib/systemd/system/rc-local.service'. '/usr/lib/systemd/system/rc.service'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/lib/systemd/system/rc-local.service.d/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/lib/systemd/system/rc-local.service.d/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/etc/rc.local'. '/lib/systemd/system/rc-local.service'. '/lib/systemd/system/rc.service'. '/usr/lib/systemd/system/rc-local.service'. '/usr/lib/systemd/system/rc.service'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/lib/systemd/system/rc-local.service.d/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/lib/systemd/system/rc-local.service.d/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /etc/rc.local
- path: /lib/systemd/system/rc-local.service
- path: /lib/systemd/system/rc.service
- path: /usr/lib/systemd/system/rc-local.service
- path: /usr/lib/systemd/system/rc.service
matchDirectories:
- dir: /lib/systemd/system/rc-local.service.d/
recursive: true
- dir: /usr/lib/systemd/system/rc-local.service.d/
recursive: true
file:
matchPaths:
- path: /etc/rc.local
- path: /lib/systemd/system/rc-local.service
- path: /lib/systemd/system/rc.service
- path: /usr/lib/systemd/system/rc-local.service
- path: /usr/lib/systemd/system/rc.service
matchDirectories:
- dir: /lib/systemd/system/rc-local.service.d/
recursive: true
readOnly: false
- dir: /usr/lib/systemd/system/rc-local.service.d/
recursive: true
readOnly: false
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/lib/python3.10/site-packages/pygments/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/python -m pip install pygments*' pattern. '/*/*/python -m pip install pygments*' pattern. '/*/python -m pip install pygments*' pattern. '/*/*/*/pip install pygments*' pattern. '/*/*/pip install pygments*' pattern. '/*/pip install pygments*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPatterns:
- pattern: /*/*/*/python -m pip install pygments*
- pattern: /*/*/python -m pip install pygments*
- pattern: /*/python -m pip install pygments*
- pattern: /*/*/*/pip install pygments*
- pattern: /*/*/pip install pygments*
- pattern: /*/pip install pygments*
file:
matchDirectories:
- dir: /usr/local/lib/python3.10/site-packages/pygments/
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/log/development.log' pattern, '/**/logs/development.log' pattern, '/**/development.log' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /**/log/development.log
- pattern: /**/logs/development.log
- pattern: /**/development.log
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/XAUTOCLAIM' pattern. '/*/*/XCLAIM' pattern. '/*/XDEL' pattern. '/*/*/XAUTOCLAIM' pattern. '/*/XAUTOCLAIM' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPatterns:
- pattern: /*/*/*/XAUTOCLAIM
- pattern: /*/*/XCLAIM
- pattern: /*/XDEL
- pattern: /*/*/XAUTOCLAIM
- pattern: /*/XAUTOCLAIM
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/smb.conf' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /**/smb.conf
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/proc/meminfo'. '/proc/mounts'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /proc/meminfo
- path: /proc/mounts
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/home/user1/secret_data*' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /home/user1/secret_data*
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/home/user1/secret_data*' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPatterns:
- pattern: /home/user1/secret_data*
ownerOnly: true
readOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/cat', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
- WARNING
file:
matchDirectories:
- dir: /credentials/
recursive: true
fromSource:
- path: /bin/cat
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchPaths:
- path: /home/user1/secret_data1.txt
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
file:
matchDirectories:
- dir: /credentials/
recursive: true
readOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/bin/apt
- path: /usr/bin/apt-get
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/scp'. '/bin/scp'. '/usr/bin/scp'. '/bin/scp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
action: Block
process:
matchPaths:
- path: /usr/bin/scp
- path: /bin/scp
- path: /usr/bin/scp
- path: /bin/scp |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/bin/silly-demo'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
run: centos
process:
matchPaths:
- path: /usr/local/bin/silly-demo
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/users.xml'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchPaths:
- path: /usr/local/tomcat/conf/users.xml
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/logs/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/log/tomcat/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchDirectories:
- dir: /usr/local/tomcat/logs/
ownerOnly: true
recursive: true
- dir: /var/log/tomcat/
ownerOnly: true
recursive: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/mongo/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchDirectories:
- dir: /var/lib/mongo/
recursive: true
ownerOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the network-related policies. In this case, rule applies to ICMP network traffic. Specifies what to do when rules match, which means relevant network activities will be logged. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
network:
matchProtocols:
- protocol: icmp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the network-related policies. In this case, rule applies to raw network traffic. Specifies what to do when rules match, which means relevant network activities will be logged. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
network:
matchProtocols:
- protocol: raw
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/chown'. '/bin/chmod'. '/bin/chown'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /usr/bin/chmod
- path: /usr/bin/chown
- path: /bin/chmod
- path: /bin/chown
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/mount'. '/usr/bin/mount'. '/bin/umount'. '/usr/bin/umount'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /bin/mount
- path: /usr/bin/mount
- path: /bin/umount
- path: /usr/bin/umount
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/who'. '/usr/bin/w'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /usr/bin/who
- path: /usr/bin/w
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source Specifies a rule that matches a specific file absolute path '/usr/bin/shred'. '/usr/bin/rm'. '/bin/mv'. '/bin/rm'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/root/*_history'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/shred'. '/usr/bin/rm'. '/bin/rm'. '/bin/mv'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/home/*/*_history'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchPaths:
- fromSource:
- path: /usr/bin/shred
- path: /usr/bin/rm
- path: /bin/mv
- path: /bin/rm
- path: /usr/bin/mv
path: /root/*_history
- fromSource:
- path: /usr/bin/shred
- path: /usr/bin/rm
- path: /bin/rm
- path: /bin/mv
- path: /usr/bin/mv
path: /home/*/*_history
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/run/secrets/kubernetes.io/serviceaccount/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchDirectories:
- dir: /run/secrets/kubernetes.io/serviceaccount/
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/spool/cron/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/cron/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/cron.d/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/cron.daily/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/cron.hourly/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/cron.monthly/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/cron.weekly/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies a rule that matches a specific file absolute path '/etc/crontab'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchDirectories:
- dir: /var/spool/cron/
recursive: true
- dir: /var/cron/
recursive: true
- dir: /etc/cron.d/
recursive: true
- dir: /etc/cron.daily/
recursive: true
- dir: /etc/cron.hourly/
recursive: true
- dir: /etc/cron.monthly/
recursive: true
- dir: /etc/cron.weekly/
recursive: true
matchPaths:
- path: /etc/crontab
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchDirectories:
- dir: /etc/
readOnly: true
recursive: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/bin/kubectl'. '/usr/bin/kubectl'. '/usr/local/bin/docker'. '/usr/bin/docker'. '/usr/local/bin/crictl'. '/usr/bin/crictl'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /usr/local/bin/kubectl
- path: /usr/bin/kubectl
- path: /usr/local/bin/docker
- path: /usr/bin/docker
- path: /usr/local/bin/crictl
- path: /usr/bin/crictl
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/issue'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/issue.net'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/hosts'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/sysconfig/network'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchPaths:
- path: /etc/issue
readOnly: true
- path: /etc/issue.net
readOnly: true
- path: /etc/hosts
readOnly: true
- path: /etc/sysconfig/network
readOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/asm'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/compile'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/link'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /usr/local/go/pkg/tool/linux_amd64/asm
fromSource:
- path: /usr/local/go/bin/go
- path: /usr/local/go/pkg/tool/linux_amd64/compile
fromSource:
- path: /usr/local/go/bin/go
- path: /usr/local/go/pkg/tool/linux_amd64/link
fromSource:
- path: /usr/local/go/bin/go
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/root/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/home/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/etc/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chsh'. '/bin/chmod'. '/bin/chown'. '/bin/chgrp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /usr/bin/chsh
- path: /bin/chmod
- path: /bin/chown
- path: /bin/chgrp
file:
matchDirectories:
- dir: /bin/
fromSource:
- path: /bin/rm
- dir: /root/
fromSource:
- path: /bin/rm
- dir: /home/
fromSource:
- path: /bin/rm
- dir: /etc/
fromSource:
- path: /bin/rm
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/timelion/run' pattern. '/**/**/timelion/run' pattern. '/**/**/api/timelion/run' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPatterns:
- pattern: /**/timelion/run
- pattern: /**/**/timelion/run
- pattern: /**/**/api/timelion/run
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mysql/my.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/mariadb.conf.d'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/conf.d'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/debian-start'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/debian.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/mariadb.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/mysqld.pid'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/tmp/mysql.sock'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/system/mysql.service'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/system/mysqld.service'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/lib/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/share/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/var/lib/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/var/log/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/local/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchPaths:
- path: /etc/mysql/my.cnf
ownerOnly: true
- path: /etc/mysql/mariadb.conf.d
ownerOnly: true
- path: /etc/mysql/conf.d
ownerOnly: true
- path: /etc/mysql/debian-start
ownerOnly: true
- path: /etc/mysql/debian.cnf
ownerOnly: true
- path: /etc/mysql/mariadb.cnf
ownerOnly: true
- path: /mysqld.pid
ownerOnly: true
- path: /tmp/mysql.sock
ownerOnly: true
- path: /usr/lib/systemd/system/mysql.service
ownerOnly: true
- path: /usr/lib/systemd/system/mysqld.service
ownerOnly: true
matchDirectories:
- dir: /etc/mysql/
recursive: true
ownerOnly: true
- dir: /usr/lib/mysql/
recursive: true
ownerOnly: true
- dir: /usr/share/mysql/
recursive: true
ownerOnly: true
- dir: /var/lib/mysql/
recursive: true
ownerOnly: true
- dir: /var/log/mysql/
recursive: true
ownerOnly: true
- dir: /usr/local/mysql/
recursive: true
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/fchmod' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPatterns:
- pattern: /**/fchmod
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bash_profile'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/root/.bashrc'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/profile'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchPaths:
- path: /root/.bash_profile
readOnly: true
- path: /root/.bashrc
readOnly: true
- path: /etc/profile
readOnly: true
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. applies the rule to files with the '/**/bower.json' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchPatterns:
- pattern: /**/bower.json
readOnly: false
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/strings/ctype-simple.c'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchPaths:
- path: /strings/ctype-simple.c
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/lib/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/share/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/var/lib/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/var/log/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/local/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchDirectories:
- dir: /etc/mysql/
recursive: true
ownerOnly: true
- dir: /usr/lib/mysql/
recursive: true
ownerOnly: true
- dir: /usr/share/mysql/
recursive: true
ownerOnly: true
- dir: /var/lib/mysql/
recursive: true
ownerOnly: true
- dir: /var/log/mysql/
recursive: true
ownerOnly: true
- dir: /usr/local/mysql/
recursive: true
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/cassandra/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/chown', specifies a rule that matches a specific directory path '/usr/bin/chmod', specifies a rule that matches a specific directory path '/usr/bin/chgrp', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchDirectories:
- dir: /etc/cassandra/
recursive: true
readOnly: false
fromSource:
- path: /usr/bin/chown
- path: /usr/bin/chmod
- path: /usr/bin/chgrp
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/sudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/sudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /usr/bin/sudo
ownerOnly: true
- path: /bin/sudo
ownerOnly: true
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/www/html/wp-content/uploads/workreap-temp/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly in disenabled, so any user can access this file. applies the rule to files with the '/**/wp-content/uploads/workreap-temp/' pattern, ownerOnly in disenabled, so any user can access this file. '/**/**/wp-content/uploads/workreap-temp/' pattern, ownerOnly in disenabled, so any user can access this file. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/www/html/wp-content/uploads/workreap-temp/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly in disenabled, so any user can access this file. applies the rule to processes with the '/**/wp-content/uploads/workreap-temp/' pattern. ownerOnly in disenabled, so any user can access this file. '/**/**/wp-content/uploads/workreap-temp/' pattern. ownerOnly in disenabled, so any user can access this file. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchDirectories:
- dir: /var/www/html/wp-content/uploads/workreap-temp/
recursive: true
ownerOnly: false
matchPatterns:
- pattern: /**/wp-content/uploads/workreap-temp/
ownerOnly: false
- pattern: /**/**/wp-content/uploads/workreap-temp/
ownerOnly: false
file:
matchDirectories:
- dir: /var/www/html/wp-content/uploads/workreap-temp/
readOnly: false
recursive: true
ownerOnly: false
matchPatterns:
- pattern: /**/wp-content/uploads/workreap-temp/
readOnly: false
ownerOnly: false
- pattern: /**/**/wp-content/uploads/workreap-temp/
readOnly: false
ownerOnly: false
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. applies the rule to files with the '/**/initial.php' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/curl' pattern. '/**/bash' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchPatterns:
- pattern: /**/initial.php
process:
matchPatterns:
- pattern: /**/curl
- pattern: /**/bash
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related Linux capabilities. apply the rule to the capability name 'sys_admin'. Specifies what to do when rules match, in this case, the 'Block' action blocks the matching capability behavior. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
capabilities:
matchCapabilities:
- capability: sys_admin
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. applies the rule to files with the '/**/databases.yml' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchPatterns:
- pattern: /**/databases.yml
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/ls'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/bin/dash'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /bin/ls
fromSource:
- path: /bin/dash
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
file:
matchPaths:
- path: /home/user1/secret_data1.txt
ownerOnly: true
fromSource:
- path: /bin/cat
action: Allow |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/groupdel'. '/usr/sbin/userdel'. '/usr/sbin/chgpasswd'. '/usr/sbin/groupmod0o'. '/usr/sbin/groupadd'. '/usr/sbin/newusers'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /usr/sbin/groupdel
- path: /usr/sbin/userdel
- path: /usr/sbin/chgpasswd
- path: /usr/sbin/groupmod0o
- path: /usr/sbin/groupadd
- path: /usr/sbin/newusers
- path: /usr/sbin/chpasswd
- path: /usr/sbin/usermod
action: Block |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/modprobe'. '/usr/sbin/insmod'. '/usr/sbin/modinfo'. '/usr/sbin/lsmod'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /usr/sbin/modprobe
- path: /usr/sbin/insmod
- path: /usr/sbin/modinfo
- path: /usr/sbin/lsmod
action: Audit |
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/netstat'. '/bin/netstat'. '/usr/sbin/ip'. '/usr/bin/ip'. '/sbin/ip'. '/bin/ip'. '/usr/sbin/iw'. '/sbin/iw'. '/usr/sbin/ethtool'. '/sbin/ethtool'. '/usr/sbin/ifconfig'. '/sbin/ifconfig'. '/usr/sbin/arp'. '/sbin/arp'. '/usr/sbin/iwconfig'. '/sbin/iwconfig'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process. | kind: KubeArmorPolicy
spec:
selector:
matchLabels:
app: mongo
process:
matchPaths:
- path: /usr/bin/netstat
- path: /bin/netstat
- path: /usr/sbin/ip
- path: /usr/bin/ip
- path: /sbin/ip
- path: /bin/ip
- path: /usr/sbin/iw
- path: /sbin/iw
- path: /usr/sbin/ethtool
- path: /sbin/ethtool
- path: /usr/sbin/ifconfig
- path: /sbin/ifconfig
- path: /usr/sbin/arp
- path: /sbin/arp
- path: /usr/sbin/iwconfig
- path: /sbin/iwconfig
action: Audit |