forked from stolostron/policy-collection
-
Notifications
You must be signed in to change notification settings - Fork 0
/
policy-ocp4-certs.yaml
121 lines (121 loc) · 3.76 KB
/
policy-ocp4-certs.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
apiVersion: policy.open-cluster-management.io/v1
kind: Policy
metadata:
name: policy-cert-ocp4
annotations:
policy.open-cluster-management.io/standards: NIST SP 800-53
policy.open-cluster-management.io/categories: SC System and Communications Protection
policy.open-cluster-management.io/controls: SC-12 Cryptographic Key Establishment and Management
spec:
remediationAction: inform
disabled: false
policy-templates:
- objectDefinition:
apiVersion: policy.open-cluster-management.io/v1
kind: CertificatePolicy
metadata:
name: openshift-cert-policy
spec:
namespaceSelector:
include:
- openshift-service-ca-operator
- openshift-service-ca
- openshift-operator-lifecycle-manager
- openshift-apiserver
- openshift-apiserver-operator
- openshift-authentication
- openshift-authentication-operator
- openshift-cluster-machine-approver
- openshift-cluster-samples-operator
- openshift-cluster-storage-operator
- openshift-cluster-version
- openshift-config
- openshift-config-operator
- openshift-console
- openshift-console-operator
- openshift-controller-manager
- openshift-controller-manager-operator
- openshift-dns
- openshift-dns-operator
- openshift-etcd
- openshift-etcd-operator
- openshift-image-registry
- openshift-ingress-operator
- openshift-insights
- openshift-kube-scheduler-operator
- openshift-kube-storage-version-migrator-operator
- openshift-machine-api
- openshift-machine-config-operator
- openshift-marketplace
- openshift-monitoring
- openshift-multus
remediationAction: inform
minimumDuration: 400h
severity: low
- objectDefinition:
apiVersion: policy.open-cluster-management.io/v1
kind: CertificatePolicy
metadata:
name: openshift-cert-policy-ingress
spec:
namespaceSelector:
include:
- openshift-ingress
remediationAction: inform
minimumDuration: 24h
minimumCADuration: 400h
severity: low
- objectDefinition:
apiVersion: policy.open-cluster-management.io/v1
kind: CertificatePolicy
metadata:
name: openshift-cert-policy-csr
spec:
namespaceSelector:
include:
- openshift-kube-apiserver-operator
- openshift-kube-controller-manager-operator
remediationAction: inform
minimumDuration: 400h
minimumCADuration: 24h
severity: low
- objectDefinition:
apiVersion: policy.open-cluster-management.io/v1
kind: CertificatePolicy
metadata:
name: openshift-cert-policy-mgr
spec:
namespaceSelector:
include:
- openshift-config-managed
- openshift-kube-apiserver
- openshift-kube-scheduler
- openshift-kube-controller-manager
remediationAction: inform
minimumDuration: 24h
severity: low
---
apiVersion: policy.open-cluster-management.io/v1
kind: PlacementBinding
metadata:
name: binding-policy-cert-ocp4
placementRef:
name: placement-policy-cert-ocp4
kind: PlacementRule
apiGroup: apps.open-cluster-management.io
subjects:
- name: policy-cert-ocp4
kind: Policy
apiGroup: policy.open-cluster-management.io
---
apiVersion: apps.open-cluster-management.io/v1
kind: PlacementRule
metadata:
name: placement-policy-cert-ocp4
spec:
clusterConditions:
- status: "True"
type: ManagedClusterConditionAvailable
clusterSelector:
matchExpressions:
- {key: vendor, operator: In, values: ["OpenShift"]}