Uploaded image for project: 'OpenShift API for Data Protection'
  1. OpenShift API for Data Protection
  2. OADP-2493

Allow disabling "pod-security.kubernetes.io/enforce: privileged" for OADP-protected namespaces

    XMLWordPrintable

Details

    • Feature Request
    • Resolution: Unresolved
    • Normal
    • OADP 1.4.0
    • None
    • OADP, operator
    • None
    • False
    • Hide

      None

      Show
      None
    • False
    • Not Selected
    • ToDo
    • 0
    • 0% 0%
    • 0
    • 0
    • Very Likely
    • 0
    • None
    • Unset
    • Unknown

    Description

      Proposed title of this feature request

      Allow disabling "pod-security.kubernetes.io/enforce: privileged" for OADP-protected namespaces

      What is the nature and description of the request?

      Customer is reviewing the security of their platform and has noticed that in the namespace in which a `DataProtectionApplication` is created (using the OADP Operator on OpenShift) is managed by the operator, the namespace is then statically set to the privileged PSA profile:

      {{kind: Namespace
      apiVersion: v1
      metadata:
      [...]
      labels:
      [...]
      pod-security.kubernetes.io/enforce: privileged}}

      The customer would like to disable this behaviour as the customer does not use Restic or Data Mover.

      Why does the customer need this? (List the business requirements here)

      Customer would like to enforce the principle-of-least-privileges. The customer does not use Restic or Data Mover and therefore would not need this permission on a protected namespace.

      Having more fine-grained privileges would increase the perceived security of the platform.

      List affected component/s.

      OADP Operator

       

      Potentially blocking velero issues:

      Backup requires cluster scope to succeed, even when installed without clusterAdministrator · Issue #5156 · vmware-tanzu/velero (github.com)

      Attachments

        Activity

          People

            wnstb Wes Hayutin
            rhn-support-skrenger Simon Krenger
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

            Dates

              Created:
              Updated: