instruction
stringlengths
172
6.32k
output
stringlengths
88
4.06k
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/root/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchDirectories: - dir: /usr/local/tomcat/ ownerOnly: true - dir: /root/ ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/users.xml'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /usr/local/tomcat/conf/users.xml ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/jaspic-providers.xml'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /usr/local/tomcat/conf/jaspic-providers.xml ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/chown'. '/bin/chmod'. '/bin/chown'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/chmod - path: /usr/bin/chown - path: /bin/chmod - path: /bin/chown action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchDirectories: - dir: /etc/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/sbin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/sbin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/bin/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchDirectories: - dir: /bin/ readOnly: true recursive: true - dir: /sbin/ readOnly: true recursive: true - dir: /usr/sbin/ readOnly: true recursive: true - dir: /usr/bin/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/asm'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/compile'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/link'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/local/go/pkg/tool/linux_amd64/asm fromSource: - path: /usr/local/go/bin/go - path: /usr/local/go/pkg/tool/linux_amd64/compile fromSource: - path: /usr/local/go/bin/go - path: /usr/local/go/pkg/tool/linux_amd64/link fromSource: - path: /usr/local/go/bin/go action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/root/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/home/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/etc/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chsh'. '/bin/chmod'. '/bin/chown'. '/bin/chgrp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/chsh - path: /bin/chmod - path: /bin/chown - path: /bin/chgrp file: matchDirectories: - dir: /bin/ fromSource: - path: /bin/rm - dir: /root/ fromSource: - path: /bin/rm - dir: /home/ fromSource: - path: /bin/rm - dir: /etc/ fromSource: - path: /bin/rm action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/profile'. '/root/.bashrc'. '/root/.bash_login'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /etc/profile - path: /root/.bashrc - path: /root/.bash_login action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/go/src/math/big'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /usr/local/go/src/math/big action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/go/src/cmd/go/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchDirectories: - dir: /usr/local/go/src/cmd/go/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/go/src/crypto/elliptic/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchDirectories: - dir: /usr/local/go/src/crypto/elliptic/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/mysql*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPatterns: - pattern: /**/mysql* action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/my.cnf' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /**/my.cnf ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/good'. '/usr/bin/good'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: process: matchPaths: - path: /bin/good - path: /usr/bin/good action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/strings/ctype-simple.c'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /strings/ctype-simple.c action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/strings/ctype-latin1.c'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /strings/ctype-latin1.c action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/squid-reports/**' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /**/squid-reports/** action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mysql/my.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/mariadb.conf.d'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/conf.d'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/debian-start'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/debian.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/mariadb.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/mysqld.pid'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/tmp/mysql.sock'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/system/mysql.service'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/system/mysqld.service'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /etc/mysql/my.cnf ownerOnly: true - path: /etc/mysql/mariadb.conf.d ownerOnly: true - path: /etc/mysql/conf.d ownerOnly: true - path: /etc/mysql/debian-start ownerOnly: true - path: /etc/mysql/debian.cnf ownerOnly: true - path: /etc/mysql/mariadb.cnf ownerOnly: true - path: /mysqld.pid ownerOnly: true - path: /tmp/mysql.sock ownerOnly: true - path: /usr/lib/systemd/system/mysql.service ownerOnly: true - path: /usr/lib/systemd/system/mysqld.service ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchDirectories: - dir: /etc/mysql/ recursive: true ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /etc/passwd ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/*.conf' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /**/*.conf ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/ua-parser.js' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /**/ua-parser.js ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/*ghostdog.sh' pattern, '/*ghostdog.sh' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/bin/sh'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /**/*ghostdog.sh - pattern: /*ghostdog.sh process: matchPaths: - path: /usr/bin/chmod - path: /bin/sh action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/cassandra/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/chown', specifies a rule that matches a specific directory path '/usr/bin/chmod', specifies a rule that matches a specific directory path '/usr/bin/chgrp', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchDirectories: - dir: /etc/cassandra/ recursive: true readOnly: false fromSource: - path: /usr/bin/chown - path: /usr/bin/chmod - path: /usr/bin/chgrp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/bin/'. '/usr/local/bin/'. '/bin/'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/bin/mvn'. applies the rule to processes with the '/**/qtp*' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchDirectories: - dir: /usr/bin/ - dir: /usr/local/bin/ - dir: /bin/ fromSource: - path: /usr/bin/mvn matchPatterns: - pattern: /**/qtp* action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/usr/local/tomcat/groovy' pattern, Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/lib/groovy-2.3.9.jar'. '/usr/local/tomcat/groovy.session'. '/usr/local/tomcat/bin/catalina.sh'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/tmp/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /**/usr/local/tomcat/groovy matchPaths: - path: /usr/local/tomcat/lib/groovy-2.3.9.jar - path: /usr/local/tomcat/groovy.session - path: /usr/local/tomcat/bin/catalina.sh matchDirectories: - dir: /tmp/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. '/etc/shadow'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/src/server'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /etc/passwd - path: /etc/shadow fromSource: - path: /src/server action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/WEB-INF/**/*.*' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /**/WEB-INF/**/*.* action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related Linux capabilities. apply the rule to the capability name 'sys_admin'. Specifies what to do when rules match, in this case, the 'Block' action blocks the matching capability behavior.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos capabilities: matchCapabilities: - capability: sys_admin action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/id'. '/usr/bin/groups'. '/usr/bin/net'. '/usr/bin/finger'. '/usr/bin/getent'. '/usr/bin/lslogins'. '/usr/bin/users'. '/usr/bin/w'. '/usr/bin/last'. '/usr/bin/lastlog'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/id - path: /usr/bin/groups - path: /usr/bin/net - path: /usr/bin/finger - path: /usr/bin/getent - path: /usr/bin/lslogins - path: /usr/bin/users - path: /usr/bin/w - path: /usr/bin/last - path: /usr/bin/lastlog action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/ps'. '/usr/bin/ps'. '/usr/bin/pgrep'. '/usr/bin/top'. '/usr/bin/htop'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /bin/ps - path: /usr/bin/ps - path: /usr/bin/pgrep - path: /usr/bin/top - path: /usr/bin/htop action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/lib/python2.7/dist-packages/pwnlib/shellcraft/templates/amd64/linux/syscalls/mprotect.asm'. '/usr/local/go/src/unsafe/unsafe.go'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/lib/python2.7/dist-packages/pwnlib/', specifies a rule that matches a specific directory path '/usr/lib/go-1.10/pkg/', specifies a rule that matches a specific directory path '/usr/lib/python3/dist-packages/', specifies a rule that matches a specific directory path '/usr/local/go/', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/readlink'. '/usr/local/go/src/unsafe/unsafe.go'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/readlink - path: /usr/local/go/src/unsafe/unsafe.go file: matchPaths: - path: /usr/local/lib/python2.7/dist-packages/pwnlib/shellcraft/templates/amd64/linux/syscalls/mprotect.asm - path: /usr/local/go/src/unsafe/unsafe.go matchDirectories: - dir: /usr/local/lib/python2.7/dist-packages/pwnlib/ - dir: /usr/lib/go-1.10/pkg/ - dir: /usr/lib/python3/dist-packages/ - dir: /usr/local/go/ action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/service.pwd' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /**/service.pwd action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/who'. '/usr/bin/w'. '/usr/bin/id'. '/usr/bin/whoami'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/who - path: /usr/bin/w - path: /usr/bin/id - path: /usr/bin/whoami action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/rm'. '/usr/bin/unlink'. '/usr/bin/rmdir'. applies the rule to processes with the '/**/rm' pattern. '/**/rmdir' pattern. '/**/unlink' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/rm - path: /usr/bin/unlink - path: /usr/bin/rmdir matchPatterns: - pattern: /**/rm - pattern: /**/rmdir - pattern: /**/unlink action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/dev/bus/usb'. '/dev/fd0'. '/dev/fd1'. '/dev/scd0'. '/dev/scd0'. '/dev/sr0'. '/dev/sr1'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/dev/ttyUSB0'. '/dev/ttyUSB1'. '/dev/ttyACM0'. '/dev/ttyS0'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /dev/bus/usb - path: /dev/fd0 - path: /dev/fd1 - path: /dev/scd0 - path: /dev/scd0 - path: /dev/sr0 - path: /dev/sr1 process: matchPaths: - path: /dev/ttyUSB0 - path: /dev/ttyUSB1 - path: /dev/ttyACM0 - path: /dev/ttyS0 action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/cache/nginx/client_temp/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/sbin/nginx', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchDirectories: - dir: /var/cache/nginx/client_temp/ fromSource: - path: /usr/sbin/nginx action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/ssh'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/ssh'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/sudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/sudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/visudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/visudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/last'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/last'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/find'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/find'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/file'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/ss'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/ufw'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/iptables'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/passwd'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/pwck'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/setfacl'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/getfacl'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/sestatus'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lshw'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lshw'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lscpu'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lscpu'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lsblk'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lsblk'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lsusb'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lsusb'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lspci'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lspci'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/lsscsi'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/lsscsi'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/hdparm'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/hdparm'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/fdisk'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/fdisk'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/sbin/dmidecode'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/sbin/dmidecode'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/bin/wget'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/wget'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/ssh ownerOnly: true - path: /bin/ssh ownerOnly: true - path: /usr/bin/sudo ownerOnly: true - path: /bin/sudo ownerOnly: true - path: /usr/sbin/visudo ownerOnly: true - path: /sbin/visudo ownerOnly: true - path: /usr/bin/last ownerOnly: true - path: /bin/last ownerOnly: true - path: /usr/bin/find ownerOnly: true - path: /bin/find ownerOnly: true - path: /usr/bin/file ownerOnly: true - path: /usr/bin/ss ownerOnly: true - path: /usr/sbin/ufw ownerOnly: true - path: /usr/sbin/iptables ownerOnly: true - path: /usr/bin/passwd ownerOnly: true - path: /usr/sbin/pwck ownerOnly: true - path: /usr/bin/setfacl ownerOnly: true - path: /usr/bin/getfacl ownerOnly: true - path: /usr/sbin/sestatus ownerOnly: true - path: /usr/bin/lshw ownerOnly: true - path: /bin/lshw ownerOnly: true - path: /usr/bin/lscpu ownerOnly: true - path: /bin/lscpu ownerOnly: true - path: /usr/bin/lsblk ownerOnly: true - path: /bin/lsblk ownerOnly: true - path: /usr/bin/lsusb ownerOnly: true - path: /bin/lsusb ownerOnly: true - path: /usr/bin/lspci ownerOnly: true - path: /bin/lspci ownerOnly: true - path: /usr/bin/lsscsi ownerOnly: true - path: /bin/lsscsi ownerOnly: true - path: /usr/sbin/hdparm ownerOnly: true - path: /sbin/hdparm ownerOnly: true - path: /usr/sbin/fdisk ownerOnly: true - path: /sbin/fdisk ownerOnly: true - path: /usr/sbin/dmidecode ownerOnly: true - path: /sbin/dmidecode ownerOnly: true - path: /usr/bin/wget ownerOnly: true - path: /bin/wget ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/root/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/nc'. '/usr/bin/dig'. '/usr/bin/ncat'. '/usr/bin/nmap'. '/usr/sbin/tcpdump'. '/usr/bin/tcpdump'. '/usr/bin/tshark'. '/usr/bin/ngrep'. '/usr/bin/telnet'. '/usr/bin/mitmproxy'. '/usr/bin/socat'. '/usr/sbin/zmap'. '/usr/bin/login'. '/usr/bin/su'. '/usr/sbin/nologin'. '/usr/bin/faillog'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/shadowconfig'. '/usr/sbin/grpck'. '/usr/sbin/pwunconv'. '/usr/sbin/grpconv'. '/usr/sbin/pwck'. '/usr/sbin/groupmod'. '/usr/sbin/vipw'. '/usr/sbin/pwconv'. '/usr/sbin/useradd'. '/usr/sbin/newusers'. '/usr/sbin/cppw'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/grpunconv'. '/usr/sbin/chgpasswd'. '/usr/sbin/userdel'. '/usr/bin/chage'. '/usr/bin/chsh'. '/usr/bin/gpasswd'. '/usr/bin/chfn'. '/usr/bin/expiry'. '/usr/bin/passwd'. '/usr/sbin/vigr'. '/usr/sbin/cpgr'. '/usr/sbin/adduser'. '/usr/sbin/addgroup'. '/usr/sbin/deluser'. '/usr/sbin/delgroup'. '/usr/bin/chage'. '/usr/bin/gpasswd'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/adduser'. '/usr/sbin/deluser'. '/usr/sbin/chpasswd'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/addgroup'. '/usr/sbin/delgroup'. '/usr/sbin/groupmems'. '/usr/sbin/groupmod'. '/usr/sbin/grpck'. '/usr/sbin/grpconv'. '/usr/sbin/grpunconv'. '/usr/sbin/newusers'. '/usr/sbin/pwck'. '/usr/sbin/pwconv'. '/usr/sbin/pwunconv'. '/usr/sbin/useradd'. '/usr/sbin/userdel'. '/usr/sbin/usermod'. '/usr/sbin/vigr'. '/usr/sbin/vipw'. '/usr/sbin/unix_chkpwd'. '/usr/bin/openssl'. '/usr/sbin/update-ca-certificates'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/chmod - path: /usr/bin/nc - path: /usr/bin/dig - path: /usr/bin/ncat - path: /usr/bin/nmap - path: /usr/sbin/tcpdump - path: /usr/bin/tcpdump - path: /usr/bin/tshark - path: /usr/bin/ngrep - path: /usr/bin/telnet - path: /usr/bin/mitmproxy - path: /usr/bin/socat - path: /usr/sbin/zmap - path: /usr/bin/login - path: /usr/bin/su - path: /usr/sbin/nologin - path: /usr/bin/faillog - path: /usr/bin/lastlog - path: /usr/bin/newgrp - path: /usr/bin/sg - path: /usr/sbin/shadowconfig - path: /usr/sbin/grpck - path: /usr/sbin/pwunconv - path: /usr/sbin/grpconv - path: /usr/sbin/pwck - path: /usr/sbin/groupmod - path: /usr/sbin/vipw - path: /usr/sbin/pwconv - path: /usr/sbin/useradd - path: /usr/sbin/newusers - path: /usr/sbin/cppw - path: /usr/sbin/chpasswd - path: /usr/sbin/usermod - path: /usr/sbin/groupadd - path: /usr/sbin/groupdel - path: /usr/sbin/grpunconv - path: /usr/sbin/chgpasswd - path: /usr/sbin/userdel - path: /usr/bin/chage - path: /usr/bin/chsh - path: /usr/bin/gpasswd - path: /usr/bin/chfn - path: /usr/bin/expiry - path: /usr/bin/passwd - path: /usr/sbin/vigr - path: /usr/sbin/cpgr - path: /usr/sbin/adduser - path: /usr/sbin/addgroup - path: /usr/sbin/deluser - path: /usr/sbin/delgroup - path: /usr/bin/chage - path: /usr/bin/gpasswd - path: /usr/bin/lastlog - path: /usr/bin/newgrp - path: /usr/bin/sg - path: /usr/sbin/adduser - path: /usr/sbin/deluser - path: /usr/sbin/chpasswd - path: /usr/sbin/groupadd - path: /usr/sbin/groupdel - path: /usr/sbin/addgroup - path: /usr/sbin/delgroup - path: /usr/sbin/groupmems - path: /usr/sbin/groupmod - path: /usr/sbin/grpck - path: /usr/sbin/grpconv - path: /usr/sbin/grpunconv - path: /usr/sbin/newusers - path: /usr/sbin/pwck - path: /usr/sbin/pwconv - path: /usr/sbin/pwunconv - path: /usr/sbin/useradd - path: /usr/sbin/userdel - path: /usr/sbin/usermod - path: /usr/sbin/vigr - path: /usr/sbin/vipw - path: /usr/sbin/unix_chkpwd - path: /usr/bin/openssl - path: /usr/sbin/update-ca-certificates file: matchDirectories: - dir: /dev/ recursive: true - dir: /root/ recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/dev/', specifies a rule that matches a specific directory path '/root/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/nc'. '/usr/bin/dig'. '/usr/bin/ncat'. '/usr/bin/nmap'. '/usr/sbin/tcpdump'. '/usr/bin/tcpdump'. '/usr/bin/tshark'. '/usr/bin/ngrep'. '/usr/bin/telnet'. '/usr/bin/mitmproxy'. '/usr/bin/socat'. '/usr/sbin/zmap'. '/usr/bin/login'. '/usr/bin/su'. '/usr/sbin/nologin'. '/usr/bin/faillog'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/shadowconfig'. '/usr/sbin/grpck'. '/usr/sbin/pwunconv'. '/usr/sbin/grpconv'. '/usr/sbin/pwck'. '/usr/sbin/groupmod'. '/usr/sbin/vipw'. '/usr/sbin/pwconv'. '/usr/sbin/useradd'. '/usr/sbin/newusers'. '/usr/sbin/cppw'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/grpunconv'. '/usr/sbin/chgpasswd'. '/usr/sbin/userdel'. '/usr/bin/chage'. '/usr/bin/chsh'. '/usr/bin/gpasswd'. '/usr/bin/chfn'. '/usr/bin/expiry'. '/usr/bin/passwd'. '/usr/sbin/vigr'. '/usr/sbin/cpgr'. '/usr/sbin/adduser'. '/usr/sbin/addgroup'. '/usr/sbin/deluser'. '/usr/sbin/delgroup'. '/usr/bin/chage'. '/usr/bin/gpasswd'. '/usr/bin/lastlog'. '/usr/bin/newgrp'. '/usr/bin/sg'. '/usr/sbin/adduser'. '/usr/sbin/deluser'. '/usr/sbin/chpasswd'. '/usr/sbin/groupadd'. '/usr/sbin/groupdel'. '/usr/sbin/addgroup'. '/usr/sbin/delgroup'. '/usr/sbin/groupmems'. '/usr/sbin/groupmod'. '/usr/sbin/grpck'. '/usr/sbin/grpconv'. '/usr/sbin/grpunconv'. '/usr/sbin/newusers'. '/usr/sbin/pwck'. '/usr/sbin/pwconv'. '/usr/sbin/pwunconv'. '/usr/sbin/useradd'. '/usr/sbin/userdel'. '/usr/sbin/usermod'. '/usr/sbin/vigr'. '/usr/sbin/vipw'. '/usr/sbin/unix_chkpwd'. '/usr/bin/openssl'. '/usr/sbin/update-ca-certificates'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/chmod - path: /usr/bin/nc - path: /usr/bin/dig - path: /usr/bin/ncat - path: /usr/bin/nmap - path: /usr/sbin/tcpdump - path: /usr/bin/tcpdump - path: /usr/bin/tshark - path: /usr/bin/ngrep - path: /usr/bin/telnet - path: /usr/bin/mitmproxy - path: /usr/bin/socat - path: /usr/sbin/zmap - path: /usr/bin/login - path: /usr/bin/su - path: /usr/sbin/nologin - path: /usr/bin/faillog - path: /usr/bin/lastlog - path: /usr/bin/newgrp - path: /usr/bin/sg - path: /usr/sbin/shadowconfig - path: /usr/sbin/grpck - path: /usr/sbin/pwunconv - path: /usr/sbin/grpconv - path: /usr/sbin/pwck - path: /usr/sbin/groupmod - path: /usr/sbin/vipw - path: /usr/sbin/pwconv - path: /usr/sbin/useradd - path: /usr/sbin/newusers - path: /usr/sbin/cppw - path: /usr/sbin/chpasswd - path: /usr/sbin/usermod - path: /usr/sbin/groupadd - path: /usr/sbin/groupdel - path: /usr/sbin/grpunconv - path: /usr/sbin/chgpasswd - path: /usr/sbin/userdel - path: /usr/bin/chage - path: /usr/bin/chsh - path: /usr/bin/gpasswd - path: /usr/bin/chfn - path: /usr/bin/expiry - path: /usr/bin/passwd - path: /usr/sbin/vigr - path: /usr/sbin/cpgr - path: /usr/sbin/adduser - path: /usr/sbin/addgroup - path: /usr/sbin/deluser - path: /usr/sbin/delgroup - path: /usr/bin/chage - path: /usr/bin/gpasswd - path: /usr/bin/lastlog - path: /usr/bin/newgrp - path: /usr/bin/sg - path: /usr/sbin/adduser - path: /usr/sbin/deluser - path: /usr/sbin/chpasswd - path: /usr/sbin/groupadd - path: /usr/sbin/groupdel - path: /usr/sbin/addgroup - path: /usr/sbin/delgroup - path: /usr/sbin/groupmems - path: /usr/sbin/groupmod - path: /usr/sbin/grpck - path: /usr/sbin/grpconv - path: /usr/sbin/grpunconv - path: /usr/sbin/newusers - path: /usr/sbin/pwck - path: /usr/sbin/pwconv - path: /usr/sbin/pwunconv - path: /usr/sbin/useradd - path: /usr/sbin/userdel - path: /usr/sbin/usermod - path: /usr/sbin/vigr - path: /usr/sbin/vipw - path: /usr/sbin/unix_chkpwd - path: /usr/bin/openssl - path: /usr/sbin/update-ca-certificates file: matchDirectories: - dir: /dev/ - dir: /root/ action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/auth.log'. '/var/log/daemon.log'. '/var/log/debug'. '/var/log/debug'. '/var/log/syslog'. '/var/log/faillog'. '/var/log/lastlog'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /var/log/auth.log - path: /var/log/daemon.log - path: /var/log/debug - path: /var/log/debug - path: /var/log/syslog - path: /var/log/faillog - path: /var/log/lastlog action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/.bash_profile' pattern, '/**/.bash_login' pattern, '/**/.profile' pattern, '/**/.bashrc' pattern, Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. Specifies a rule that matches a specific file absolute path '/etc/profile'.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /etc/profile matchPatterns: - pattern: /**/.bash_profile - pattern: /**/.bash_login - pattern: /**/.profile - pattern: /**/.bashrc action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the network-related policies. In this case, rule applies to UDP network traffic. Specifies what to do when rules match, which means relevant network activities will be logged.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos network: matchProtocols: - protocol: udp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/skel/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/sbin/useradd'. '/usr/bin/chown'. '/usr/sbin/userdel'. '/usr/bin/kill'. '/usr/sbin/usermod'. '/usr/bin/passwd'. '/usr/bin/chsh'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/chmod - path: /usr/sbin/useradd - path: /usr/bin/chown - path: /usr/sbin/userdel - path: /usr/bin/kill - path: /usr/sbin/usermod - path: /usr/bin/passwd - path: /usr/bin/chsh file: matchDirectories: - dir: /etc/skel/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/local/bin/apt-get'. '/usr/bin/dpkg'. '/usr/bin/snap'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/apt - path: /usr/local/bin/apt-get - path: /usr/bin/dpkg - path: /usr/bin/snap action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/passwd'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/snmp/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/mount'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /bin/mount file: matchPaths: - path: /etc/passwd readOnly: false matchDirectories: - dir: /etc/snmp/ recursive: true readOnly: false action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/utmp'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /var/log/utmp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/var/log/mysql.log'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/rm'. '/usr/bin/touch'. '/usr/bin/cat'. '/usr/bin/nano'. '/usr/bin/vi'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /var/log/mysql.log fromSource: - path: /usr/bin/rm - path: /usr/bin/touch - path: /usr/bin/cat - path: /usr/bin/nano - path: /usr/bin/vi action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/ssh/', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. Specifies a rule that matches a specific file absolute path '/var/log/wtmp'. '/var/run/utmp'. '/var/log/auth.log'. '/etc/passwd'. '/etc/shadow'.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /var/log/wtmp - path: /var/run/utmp - path: /var/log/auth.log - path: /etc/passwd - path: /etc/shadow matchDirectories: - dir: /etc/ssh/ action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/rc.local'. '/lib/systemd/system/rc-local.service'. '/lib/systemd/system/rc.service'. '/usr/lib/systemd/system/rc-local.service'. '/usr/lib/systemd/system/rc.service'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/lib/systemd/system/rc-local.service.d/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/usr/lib/systemd/system/rc-local.service.d/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/etc/rc.local'. '/lib/systemd/system/rc-local.service'. '/lib/systemd/system/rc.service'. '/usr/lib/systemd/system/rc-local.service'. '/usr/lib/systemd/system/rc.service'. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/lib/systemd/system/rc-local.service.d/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. '/usr/lib/systemd/system/rc-local.service.d/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /etc/rc.local - path: /lib/systemd/system/rc-local.service - path: /lib/systemd/system/rc.service - path: /usr/lib/systemd/system/rc-local.service - path: /usr/lib/systemd/system/rc.service matchDirectories: - dir: /lib/systemd/system/rc-local.service.d/ recursive: true - dir: /usr/lib/systemd/system/rc-local.service.d/ recursive: true file: matchPaths: - path: /etc/rc.local - path: /lib/systemd/system/rc-local.service - path: /lib/systemd/system/rc.service - path: /usr/lib/systemd/system/rc-local.service - path: /usr/lib/systemd/system/rc.service matchDirectories: - dir: /lib/systemd/system/rc-local.service.d/ recursive: true readOnly: false - dir: /usr/lib/systemd/system/rc-local.service.d/ recursive: true readOnly: false action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/lib/python3.10/site-packages/pygments/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/python -m pip install pygments*' pattern. '/*/*/python -m pip install pygments*' pattern. '/*/python -m pip install pygments*' pattern. '/*/*/*/pip install pygments*' pattern. '/*/*/pip install pygments*' pattern. '/*/pip install pygments*' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPatterns: - pattern: /*/*/*/python -m pip install pygments* - pattern: /*/*/python -m pip install pygments* - pattern: /*/python -m pip install pygments* - pattern: /*/*/*/pip install pygments* - pattern: /*/*/pip install pygments* - pattern: /*/pip install pygments* file: matchDirectories: - dir: /usr/local/lib/python3.10/site-packages/pygments/ recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/log/development.log' pattern, '/**/logs/development.log' pattern, '/**/development.log' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /**/log/development.log - pattern: /**/logs/development.log - pattern: /**/development.log action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/*/*/*/XAUTOCLAIM' pattern. '/*/*/XCLAIM' pattern. '/*/XDEL' pattern. '/*/*/XAUTOCLAIM' pattern. '/*/XAUTOCLAIM' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPatterns: - pattern: /*/*/*/XAUTOCLAIM - pattern: /*/*/XCLAIM - pattern: /*/XDEL - pattern: /*/*/XAUTOCLAIM - pattern: /*/XAUTOCLAIM action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/**/smb.conf' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /**/smb.conf action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/proc/meminfo'. '/proc/mounts'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /proc/meminfo - path: /proc/mounts action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/home/user1/secret_data*' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /home/user1/secret_data* ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. applies the rule to files with the '/home/user1/secret_data*' pattern, ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPatterns: - pattern: /home/user1/secret_data* ownerOnly: true readOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/cat', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos - WARNING file: matchDirectories: - dir: /credentials/ recursive: true fromSource: - path: /bin/cat action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchPaths: - path: /home/user1/secret_data1.txt ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/credentials/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos file: matchDirectories: - dir: /credentials/ recursive: true readOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/apt'. '/usr/bin/apt-get'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/bin/apt - path: /usr/bin/apt-get action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/scp'. '/bin/scp'. '/usr/bin/scp'. '/bin/scp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos action: Block process: matchPaths: - path: /usr/bin/scp - path: /bin/scp - path: /usr/bin/scp - path: /bin/scp
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'run: centos'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/bin/silly-demo'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: run: centos process: matchPaths: - path: /usr/local/bin/silly-demo action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/usr/local/tomcat/conf/users.xml'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchPaths: - path: /usr/local/tomcat/conf/users.xml ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/usr/local/tomcat/logs/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/log/tomcat/', ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchDirectories: - dir: /usr/local/tomcat/logs/ ownerOnly: true recursive: true - dir: /var/log/tomcat/ ownerOnly: true recursive: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/lib/mongo/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchDirectories: - dir: /var/lib/mongo/ recursive: true ownerOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the network-related policies. In this case, rule applies to ICMP network traffic. Specifies what to do when rules match, which means relevant network activities will be logged.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo network: matchProtocols: - protocol: icmp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the network-related policies. In this case, rule applies to raw network traffic. Specifies what to do when rules match, which means relevant network activities will be logged.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo network: matchProtocols: - protocol: raw action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chmod'. '/usr/bin/chown'. '/bin/chmod'. '/bin/chown'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /usr/bin/chmod - path: /usr/bin/chown - path: /bin/chmod - path: /bin/chown action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/mount'. '/usr/bin/mount'. '/bin/umount'. '/usr/bin/umount'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /bin/mount - path: /usr/bin/mount - path: /bin/umount - path: /usr/bin/umount action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/who'. '/usr/bin/w'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /usr/bin/who - path: /usr/bin/w action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source Specifies a rule that matches a specific file absolute path '/usr/bin/shred'. '/usr/bin/rm'. '/bin/mv'. '/bin/rm'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/root/*_history'. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/usr/bin/shred'. '/usr/bin/rm'. '/bin/rm'. '/bin/mv'. '/usr/bin/mv'. Specifies a rule that matches a specific file absolute path '/home/*/*_history'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchPaths: - fromSource: - path: /usr/bin/shred - path: /usr/bin/rm - path: /bin/mv - path: /bin/rm - path: /usr/bin/mv path: /root/*_history - fromSource: - path: /usr/bin/shred - path: /usr/bin/rm - path: /bin/rm - path: /bin/mv - path: /usr/bin/mv path: /home/*/*_history action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/run/secrets/kubernetes.io/serviceaccount/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchDirectories: - dir: /run/secrets/kubernetes.io/serviceaccount/ recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/spool/cron/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/var/cron/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/cron.d/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/cron.daily/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/cron.hourly/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/cron.monthly/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. specifies a rule that matches a specific directory path '/etc/cron.weekly/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies a rule that matches a specific file absolute path '/etc/crontab'. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchDirectories: - dir: /var/spool/cron/ recursive: true - dir: /var/cron/ recursive: true - dir: /etc/cron.d/ recursive: true - dir: /etc/cron.daily/ recursive: true - dir: /etc/cron.hourly/ recursive: true - dir: /etc/cron.monthly/ recursive: true - dir: /etc/cron.weekly/ recursive: true matchPaths: - path: /etc/crontab action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/', If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchDirectories: - dir: /etc/ readOnly: true recursive: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/bin/kubectl'. '/usr/bin/kubectl'. '/usr/local/bin/docker'. '/usr/bin/docker'. '/usr/local/bin/crictl'. '/usr/bin/crictl'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /usr/local/bin/kubectl - path: /usr/bin/kubectl - path: /usr/local/bin/docker - path: /usr/bin/docker - path: /usr/local/bin/crictl - path: /usr/bin/crictl action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/issue'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/issue.net'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/hosts'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/sysconfig/network'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchPaths: - path: /etc/issue readOnly: true - path: /etc/issue.net readOnly: true - path: /etc/hosts readOnly: true - path: /etc/sysconfig/network readOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/asm'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/compile'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. apply rules to the executable processes at paths '/usr/local/go/pkg/tool/linux_amd64/link'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/usr/local/go/bin/go'. Specifies the action to take when rules match, in which case the 'Allow' action allows the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /usr/local/go/pkg/tool/linux_amd64/asm fromSource: - path: /usr/local/go/bin/go - path: /usr/local/go/pkg/tool/linux_amd64/compile fromSource: - path: /usr/local/go/bin/go - path: /usr/local/go/pkg/tool/linux_amd64/link fromSource: - path: /usr/local/go/bin/go action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/bin/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/root/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/home/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', specifies a rule that matches a specific directory path '/etc/', When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/bin/rm', Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/chsh'. '/bin/chmod'. '/bin/chown'. '/bin/chgrp'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /usr/bin/chsh - path: /bin/chmod - path: /bin/chown - path: /bin/chgrp file: matchDirectories: - dir: /bin/ fromSource: - path: /bin/rm - dir: /root/ fromSource: - path: /bin/rm - dir: /home/ fromSource: - path: /bin/rm - dir: /etc/ fromSource: - path: /bin/rm action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/timelion/run' pattern. '/**/**/timelion/run' pattern. '/**/**/api/timelion/run' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPatterns: - pattern: /**/timelion/run - pattern: /**/**/timelion/run - pattern: /**/**/api/timelion/run action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/etc/mysql/my.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/mariadb.conf.d'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/conf.d'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/debian-start'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/debian.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/etc/mysql/mariadb.cnf'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/mysqld.pid'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/tmp/mysql.sock'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/system/mysql.service'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/usr/lib/systemd/system/mysqld.service'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/lib/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/share/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/var/lib/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/var/log/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/local/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchPaths: - path: /etc/mysql/my.cnf ownerOnly: true - path: /etc/mysql/mariadb.conf.d ownerOnly: true - path: /etc/mysql/conf.d ownerOnly: true - path: /etc/mysql/debian-start ownerOnly: true - path: /etc/mysql/debian.cnf ownerOnly: true - path: /etc/mysql/mariadb.cnf ownerOnly: true - path: /mysqld.pid ownerOnly: true - path: /tmp/mysql.sock ownerOnly: true - path: /usr/lib/systemd/system/mysql.service ownerOnly: true - path: /usr/lib/systemd/system/mysqld.service ownerOnly: true matchDirectories: - dir: /etc/mysql/ recursive: true ownerOnly: true - dir: /usr/lib/mysql/ recursive: true ownerOnly: true - dir: /usr/share/mysql/ recursive: true ownerOnly: true - dir: /var/lib/mysql/ recursive: true ownerOnly: true - dir: /var/log/mysql/ recursive: true ownerOnly: true - dir: /usr/local/mysql/ recursive: true ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/fchmod' pattern. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPatterns: - pattern: /**/fchmod action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/root/.bash_profile'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/root/.bashrc'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. '/etc/profile'. If readOnly is enabled, the read operation will be only allowed, and any other operations (e.g., write) will be blocked. Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchPaths: - path: /root/.bash_profile readOnly: true - path: /root/.bashrc readOnly: true - path: /etc/profile readOnly: true action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. applies the rule to files with the '/**/bower.json' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchPatterns: - pattern: /**/bower.json readOnly: false action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/strings/ctype-simple.c'. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchPaths: - path: /strings/ctype-simple.c action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/lib/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/share/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/var/lib/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/var/log/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. specifies a rule that matches a specific directory path '/usr/local/mysql/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchDirectories: - dir: /etc/mysql/ recursive: true ownerOnly: true - dir: /usr/lib/mysql/ recursive: true ownerOnly: true - dir: /usr/share/mysql/ recursive: true ownerOnly: true - dir: /var/lib/mysql/ recursive: true ownerOnly: true - dir: /var/log/mysql/ recursive: true ownerOnly: true - dir: /usr/local/mysql/ recursive: true ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/etc/cassandra/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source specifies a rule that matches a specific directory path '/usr/bin/chown', specifies a rule that matches a specific directory path '/usr/bin/chmod', specifies a rule that matches a specific directory path '/usr/bin/chgrp', Specifies what to do when rules match, in which case the action 'Audit' monitorings access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchDirectories: - dir: /etc/cassandra/ recursive: true readOnly: false fromSource: - path: /usr/bin/chown - path: /usr/bin/chmod - path: /usr/bin/chgrp action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/sudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. '/bin/sudo'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /usr/bin/sudo ownerOnly: true - path: /bin/sudo ownerOnly: true action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/www/html/wp-content/uploads/workreap-temp/', recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly in disenabled, so any user can access this file. applies the rule to files with the '/**/wp-content/uploads/workreap-temp/' pattern, ownerOnly in disenabled, so any user can access this file. '/**/**/wp-content/uploads/workreap-temp/' pattern, ownerOnly in disenabled, so any user can access this file. Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. similar to matchpath, but for dictionaries, specifies a rule that matches a specific directory path '/var/www/html/wp-content/uploads/workreap-temp/'. recursive is enabled, so the coverage will extend to the subdirectories of the directory defined with matchDirectories. ownerOnly in disenabled, so any user can access this file. applies the rule to processes with the '/**/wp-content/uploads/workreap-temp/' pattern. ownerOnly in disenabled, so any user can access this file. '/**/**/wp-content/uploads/workreap-temp/' pattern. ownerOnly in disenabled, so any user can access this file. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchDirectories: - dir: /var/www/html/wp-content/uploads/workreap-temp/ recursive: true ownerOnly: false matchPatterns: - pattern: /**/wp-content/uploads/workreap-temp/ ownerOnly: false - pattern: /**/**/wp-content/uploads/workreap-temp/ ownerOnly: false file: matchDirectories: - dir: /var/www/html/wp-content/uploads/workreap-temp/ readOnly: false recursive: true ownerOnly: false matchPatterns: - pattern: /**/wp-content/uploads/workreap-temp/ readOnly: false ownerOnly: false - pattern: /**/**/wp-content/uploads/workreap-temp/ readOnly: false ownerOnly: false action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. applies the rule to files with the '/**/initial.php' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file. defines rules related to processes running in the selected pods. applies the rule to processes with the '/**/curl' pattern. '/**/bash' pattern. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchPatterns: - pattern: /**/initial.php process: matchPatterns: - pattern: /**/curl - pattern: /**/bash action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related Linux capabilities. apply the rule to the capability name 'sys_admin'. Specifies what to do when rules match, in this case, the 'Block' action blocks the matching capability behavior.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo capabilities: matchCapabilities: - capability: sys_admin action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. applies the rule to files with the '/**/databases.yml' pattern, Specifies what to do when rules match, in which case the action 'Block' blocks access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchPatterns: - pattern: /**/databases.yml action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/bin/ls'. When the 'fromSource' field is defined, the action is only applied to source processes in the path '/bin/dash'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /bin/ls fromSource: - path: /bin/dash action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines the policy related to file access. Specifies a rule that matches a specific file absolute path '/home/user1/secret_data1.txt'. ownerOnly is enabled, so only the owner of the executable defined by matchPaths and matchDirectories can run. When the 'fromSource' field is defined, access to the file is controlled exclusively for the specified source. In this case, working rules are established for the specified source '/bin/cat'. Specifies what to do when rules match, in which case the action 'Allow' allows access to the matching file.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo file: matchPaths: - path: /home/user1/secret_data1.txt ownerOnly: true fromSource: - path: /bin/cat action: Allow
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/groupdel'. '/usr/sbin/userdel'. '/usr/sbin/chgpasswd'. '/usr/sbin/groupmod0o'. '/usr/sbin/groupadd'. '/usr/sbin/newusers'. '/usr/sbin/chpasswd'. '/usr/sbin/usermod'. Specifies the action to take when rules match, in which case the 'Block' action blocks the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /usr/sbin/groupdel - path: /usr/sbin/userdel - path: /usr/sbin/chgpasswd - path: /usr/sbin/groupmod0o - path: /usr/sbin/groupadd - path: /usr/sbin/newusers - path: /usr/sbin/chpasswd - path: /usr/sbin/usermod action: Block
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/sbin/modprobe'. '/usr/sbin/insmod'. '/usr/sbin/modinfo'. '/usr/sbin/lsmod'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /usr/sbin/modprobe - path: /usr/sbin/insmod - path: /usr/sbin/modinfo - path: /usr/sbin/lsmod action: Audit
Create a KubeArmorPolicy for a kubernetes environment. Selects the Kubernetes pods to which this policy will apply. In this case, it selects pods with the label 'app: mongo'. defines rules related to processes running in the selected pods. apply rules to the executable processes at paths '/usr/bin/netstat'. '/bin/netstat'. '/usr/sbin/ip'. '/usr/bin/ip'. '/sbin/ip'. '/bin/ip'. '/usr/sbin/iw'. '/sbin/iw'. '/usr/sbin/ethtool'. '/sbin/ethtool'. '/usr/sbin/ifconfig'. '/sbin/ifconfig'. '/usr/sbin/arp'. '/sbin/arp'. '/usr/sbin/iwconfig'. '/sbin/iwconfig'. Specifies the action to take when rules match, in which case the 'Audit' action logs the execution of the matching process.
kind: KubeArmorPolicy spec: selector: matchLabels: app: mongo process: matchPaths: - path: /usr/bin/netstat - path: /bin/netstat - path: /usr/sbin/ip - path: /usr/bin/ip - path: /sbin/ip - path: /bin/ip - path: /usr/sbin/iw - path: /sbin/iw - path: /usr/sbin/ethtool - path: /sbin/ethtool - path: /usr/sbin/ifconfig - path: /sbin/ifconfig - path: /usr/sbin/arp - path: /sbin/arp - path: /usr/sbin/iwconfig - path: /sbin/iwconfig action: Audit