Skip to main content
CUI

Documentation - V-257514

V-257514

Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide

CAT II

Title

OpenShift must enforce network policy on the namespace for controlling the flow of information within the container platform based on organization-defined information flow control policies.

Description

<VulnDiscussion>OpenShift provides several layers of protection to control the flow of information between the container platform components and user services. Each user project is given a separate namespace and OpenShift enforces RBAC policies controlling which projects and services users can access. OpenShift forces the use of namespaces. Service accounts are a namespace resource as well, so they are segregated. RBAC policies apply to service accounts. In addition, network policies are used t...

Fix Text (Documentation Requirement)

Add a network policy to an existing project namespace by performing the following steps: 1. Create &lt;YOURFILE&gt;.yaml and insert the desired resource network policy content. The following is an example resource quota definition: apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: allow-from-same-namespace namespace: &lt;NAMESPACE&gt; spec: podSelector: {} ingress: - from: - podSelector: {} 2. Apply the network policy definition to the project namespace by executing the following: oc apply -f &lt;YOURFILE&gt;.yaml -n &lt;NAMESPACE&gt; Details regarding the configuration of resource network policy can be reviewed at https://docs.openshift.com/container-platform/4.12/networking/network_policy/about-network-policy.html. Where OpenShift Virtualization...

Documentation Status

Cancel
CUI