# based on https://kyverno.io/policies/pod-security/baseline/disallow-privileged-containers/disallow-privileged-containers/ apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-privileged-containers annotations: policies.kyverno.io/category: Pod Security Standards (Baseline) policies.kyverno.io/severity: medium policies.kyverno.io/subject: Pod policies.kyverno.io/description: >- Privileged mode disables most security mechanisms and must not be allowed. spec: validationFailureAction: audit background: true rules: - name: priviledged-containers match: resources: kinds: - Pod exclude: resources: namespaces: - calico-system validate: message: >- Privileged mode is disallowed. The fields spec.containers[*].securityContext.privileged and spec.initContainers[*].securityContext.privileged must not be set to true. pattern: spec: =(initContainers): - =(securityContext): =(privileged): "false" containers: - =(securityContext): =(privileged): "false"