UDS Exemption
Exemption
Section titled “Exemption”- Exemption Scope:
- Granting exemption for custom resources is restricted to the
uds-policy-exemptionsnamespace by default, unless specifically configured to allow exemptions across all namespaces.
- Granting exemption for custom resources is restricted to the
- Policy Updates:
- Updating the policies Pepr store with registered exemptions.
Example UDS Exemption CR
Section titled “Example UDS Exemption CR”apiVersion: uds.dev/v1alpha1kind: Exemptionmetadata: name: my-pods namespace: uds-policy-exemptionsspec: exemptions: - policies: - DisallowHostNamespaces - DisallowPrivileged - RequireNonRootUser - DropAllCapabilities - RestrictHostPathWrite - RestrictVolumeTypes matcher: namespace: my-pods name: "^my-privileged-pod.*"
- policies: - DisallowPrivileged - RequireNonRootUser - DropAllCapabilities - RestrictHostPathWrite - RestrictVolumeTypes matcher: namespace: my-pods name: "^my-hostpath-pod.*"
- policies: - DropAllCapabilities matcher: namespace: my-pods name: "^my-exempt-pod.*"Configuring UDS Core Policy Exemptions
Section titled “Configuring UDS Core Policy Exemptions”Default policy exemptions and namespace restriction/config are confined to a singular namespace: uds-policy-exemptions. We find this to be an optimal approach for UDS due to the following reasons:
- Emphasis on Security Impact:
- An exemption has the potential to diminish the overall security stance of the cluster. By isolating these exemptions within a designated namespace, administrators can readily recognize and assess the security implications associated with each exemption.
- Simplified RBAC Maintenance:
- Adopting this pattern streamlines the management of Role-Based Access Control (RBAC) for overseeing exemptions. Placing all UDS exemptions within a dedicated namespace simplifies the task of configuring and maintaining RBAC policies, enhancing overall control and transparency.
- Mitigation of Configuration Risks:
- By restricting exemptions to a specific namespace, the risk of unintentional misconfigurations in RBAC is significantly reduced. This ensures that cluster exemptions are only granted intentionally and within the confines of the designated namespace, minimizing the potential for security vulnerabilities resulting from misconfigured permissions.
Allow Exemptions In All Namespaces
Section titled “Allow Exemptions In All Namespaces”If you find that the default scoping is not the right approach for your cluster, you have the option to configure UDS-CORE at deploy time to allow exemption CRs in all namespaces:
zarf package deploy zarf-package-uds-core-*.zst --set ALLOW_ALL_NS_EXEMPTIONS=true
You can also achieve this through the uds-config.yaml:
options: # options here
shared: ALLOW_ALL_NS_EXEMPTIONS: "true"
variables: # package specific variables hereDeploying Exemptions in UDS Core Installation
Section titled “Deploying Exemptions in UDS Core Installation”In some cases, you may want to deploy custom Exemption CRs as part of your UDS Core installation. This can be done by overriding the uds-exemptions helm chart which gets applied after pepr is installed.
UDS Core does provide some ready to use exemptions to turn on out of the box. Currently we support exemptions for:
- Enabling Node Port Services on Istio Gateways
- name: corerepository: ghcr.io/defenseunicorns/packages/uds/coreref: x.x.xoverrides:pepr:uds-exemptions:values:- path: exemptions.istioGatewayNodeport.enabledvalue: true
However if you want to create an arbitrary exemption for your workloads, you can do so. Here is an example of how to do this with bundle helm overrides:
- name: core repository: ghcr.io/defenseunicorns/packages/uds/core ref: x.x.x overrides: pepr: uds-exemptions: values: - path: exemptions.custom value: - name: my-app-exemptions exemptions: - policies: - DisallowHostNamespaces - DisallowPrivileged - RequireNonRootUser matcher: namespace: my-namespace name: "^my-privileged-pod.*" kind: pod title: "My privileged pod exemption" description: "Exemption for pods that require privileged access" - policies: - DisallowNodePortServices matcher: namespace: my-namespace name: "my-service" kind: service title: "NodePort service exemption" description: "Required for external load balancer integration"