-
Story
-
Resolution: Duplicate
-
Normal
-
ACM 2.10.0
-
None
Value Statement
As an ACM admin, I want to add Kubernetes Security Context Constraints (SCC) V2 options to the component's resource YAML configuration to ensure that the Pod runs with the 'readonlyrootfilesystem' and 'privileged' settings, in order to enhance the security and functionality of our application.
In the resource config YAML, we need to add the follow context:
securityContext: privileged: false readOnlyRootFilesystem: true
Affected resources:
- [ ] hiveadmission
- [ ] hive-clustersync
- [ ] hive-controllers
Definition of Done for Engineering Story Owner (Checklist)
- [ ] Ensure that the Pod continues to function correctly with the new SCC V2 settings.
- [ ] Verify that the SCC V2 options are effective in limiting the Pod's privileges and restricting write access to the root filesystem.
Development Complete
- The code is complete.
- Functionality is working.
- Any required downstream Docker file changes are made.
Tests Automated
- [ ] Unit/function tests have been automated and incorporated into the
build. - [ ] 100% automated unit/function test coverage for new or changed APIs.
Secure Design
- [ ] Security has been assessed and incorporated into your threat model.
Multidisciplinary Teams Readiness
- [ ] Create an informative documentation issue using the [Customer
Portal_doc_issue template](
https://github.com/stolostron/backlog/issues/new?assignees=&labels=squad%3Adoc&template=doc_issue.md&title=),
and ensure doc acceptance criteria is met. Link the development issue to
the doc issue. - [ ] Provide input to the QE team, and ensure QE acceptance criteria
(established between story owner and QE focal) are met.
Support Readiness
- [ ] The must-gather script has been updated.