{"id":18062,"date":"2022-04-26T17:32:03","date_gmt":"2022-04-26T12:02:03","guid":{"rendered":"http:\/\/onlineappsdba.com\/?p=18062"},"modified":"2022-04-26T17:32:03","modified_gmt":"2022-04-26T12:02:03","slug":"pod-security-standards-pss","status":"publish","type":"post","link":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/","title":{"rendered":"\ud835\udc0f\ud835\udc28\ud835\udc1d \ud835\udc12\ud835\udc1e\ud835\udc1c\ud835\udc2e\ud835\udc2b\ud835\udc22\ud835\udc2d\ud835\udc32 \ud835\udc12\ud835\udc2d\ud835\udc1a\ud835\udc27\ud835\udc1d\ud835\udc1a\ud835\udc2b\ud835\udc1d\ud835\udc2c (\ud835\udc0f\ud835\udc12\ud835\udc12): \ud835\udc00\ud835\udc25\ud835\udc25 \ud835\udc18\ud835\udc28\ud835\udc2e \ud835\udc0d\ud835\udc1e\ud835\udc1e\ud835\udc1d \ud835\udc2d\ud835\udc28 \ud835\udc0a\ud835\udc27\ud835\udc28\ud835\udc30"},"content":{"rendered":"<p>\ud83d\udccc To enhance Kubernetes security, you must regulate and limit the number of pods that may be generated and deployed in your environment. Kubernetes has given a beta feature called Pod Security Policy (PSP) for this purpose, which will shortly be deprecated and replaced with a standard called Pod Security Standards (PSS).<\/p>\n<p>\ud83d\udccc Because PSPs are being phased out and are no longer being actively developed, cluster administrators and operators must replace those security measures. This need can be met by two options:<\/p>\n<p>\u27a1Policy-as-code (PAC) solutions from the Kubernetes ecosystem.<br \/>\n\u27a1Kubernetes Pod Security Standards (PSS) &amp; Pod Security Admission (PSA).<\/p>\n<p>\ud83d\udccc The Kubernetes Auth Special Interest Group produced the Pod Security Standards (PSS) and Pod Security Admission (PSA) in response to the PSP deprecation and the continued requirement to govern pod security out-of-the-box, using a built-in Kubernetes solution (PSA). The PSA effort includes a webhook project for admission controllers that implements the controls described in the PSS.<\/p>\n<p>\ud83e\udd13 So, want to know about \ud835\udc0f\ud835\udc28\ud835\udc1d \ud835\udc12\ud835\udc1e\ud835\udc1c\ud835\udc2e\ud835\udc2b\ud835\udc22\ud835\udc2d\ud835\udc32 \ud835\udc12\ud835\udc2d\ud835\udc1a\ud835\udc27\ud835\udc1d\ud835\udc1a\ud835\udc2b\ud835\udc1d\ud835\udc2c (\ud835\udc0f\ud835\udc12\ud835\udc12)?<\/p>\n<p>Check out this blog <a href=\"https:\/\/k21academy.com\/docker-kubernetes\/pod-security-standards-pss\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=kubernetes65_april2022\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/k21academy.com\/kubernetes65<\/a> \u2013 that covers:<\/p>\n<p>\ud83c\udf40 Pod Security Policy &amp; its depreciation<br \/>\n\ud83c\udf40 Moving to a new pod security solution<br \/>\n\ud83c\udf40 Pod Security Standards (PSS) and Pod Security Admission (PSA)<\/p>\n<p>\ud83d\udcab Want more in-depth training? Register for the \ud835\udc05\ud835\udc11\ud835\udc04\ud835\udc04 \ud835\udc02\ud835\udc0b\ud835\udc00\ud835\udc12\ud835\udc12 now at <a href=\"https:\/\/k21academy.com\/containers-kubernetes-certification-free-class\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=kubernetes02_april2022\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/k21academy.com\/k8s02<\/a><\/p>\n<p><a href=\"https:\/\/k21academy.com\/containers-kubernetes-certification-free-class\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=kubernetes02_april2022\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/k21academy.com\/wp-content\/uploads\/2022\/02\/CKA_CU.gif\" alt=\"k8s content upgrade\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udccc To enhance Kubernetes security, you must regulate and limit the number of pods that may be generated and deployed [&hellip;]<\/p>\n","protected":false},"author":115,"featured_media":18063,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[524],"tags":[],"class_list":["post-18062","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-docker-kubernetes"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pod Security Standards (PSS): All You Need to Know | K21Academy<\/title>\n<meta name=\"description\" content=\"To enhance K8s security, you must regulate and limit the number of pods that may be generated and deployed in your environment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pod Security Standards (PSS): All You Need to Know | K21Academy\" \/>\n<meta property=\"og:description\" content=\"To enhance K8s security, you must regulate and limit the number of pods that may be generated and deployed in your environment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T12:02:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/K8s-security-tool-blog-Featured-Image-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1001\" \/>\n\t<meta property=\"og:image:height\" content=\"560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Masroof Ahmad\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Masroof Ahmad\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/\",\"url\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/\",\"name\":\"Pod Security Standards (PSS): All You Need to Know | K21Academy\",\"isPartOf\":{\"@id\":\"https:\/\/onlineappsdba.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/K8s-security-tool-blog-Featured-Image-3.jpg\",\"datePublished\":\"2022-04-26T12:02:03+00:00\",\"author\":{\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb\"},\"description\":\"To enhance K8s security, you must regulate and limit the number of pods that may be generated and deployed in your environment.\",\"breadcrumb\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/#primaryimage\",\"url\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/K8s-security-tool-blog-Featured-Image-3.jpg\",\"contentUrl\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/K8s-security-tool-blog-Featured-Image-3.jpg\",\"width\":1001,\"height\":560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/onlineappsdba.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\ud835\udc0f\ud835\udc28\ud835\udc1d \ud835\udc12\ud835\udc1e\ud835\udc1c\ud835\udc2e\ud835\udc2b\ud835\udc22\ud835\udc2d\ud835\udc32 \ud835\udc12\ud835\udc2d\ud835\udc1a\ud835\udc27\ud835\udc1d\ud835\udc1a\ud835\udc2b\ud835\udc1d\ud835\udc2c (\ud835\udc0f\ud835\udc12\ud835\udc12): \ud835\udc00\ud835\udc25\ud835\udc25 \ud835\udc18\ud835\udc28\ud835\udc2e \ud835\udc0d\ud835\udc1e\ud835\udc1e\ud835\udc1d \ud835\udc2d\ud835\udc28 \ud835\udc0a\ud835\udc27\ud835\udc28\ud835\udc30\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/onlineappsdba.com\/#website\",\"url\":\"https:\/\/onlineappsdba.com\/\",\"name\":\"\",\"description\":\"Oracle Implementation &amp; Training Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/onlineappsdba.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb\",\"name\":\"Masroof Ahmad\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g\",\"caption\":\"Masroof Ahmad\"},\"url\":\"https:\/\/onlineappsdba.com\/index.php\/author\/masroof\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pod Security Standards (PSS): All You Need to Know | K21Academy","description":"To enhance K8s security, you must regulate and limit the number of pods that may be generated and deployed in your environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/","og_locale":"en_US","og_type":"article","og_title":"Pod Security Standards (PSS): All You Need to Know | K21Academy","og_description":"To enhance K8s security, you must regulate and limit the number of pods that may be generated and deployed in your environment.","og_url":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/","article_published_time":"2022-04-26T12:02:03+00:00","og_image":[{"width":1001,"height":560,"url":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/K8s-security-tool-blog-Featured-Image-3.jpg","type":"image\/jpeg"}],"author":"Masroof Ahmad","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Masroof Ahmad","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/","url":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/","name":"Pod Security Standards (PSS): All You Need to Know | K21Academy","isPartOf":{"@id":"https:\/\/onlineappsdba.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/#primaryimage"},"image":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/#primaryimage"},"thumbnailUrl":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/K8s-security-tool-blog-Featured-Image-3.jpg","datePublished":"2022-04-26T12:02:03+00:00","author":{"@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb"},"description":"To enhance K8s security, you must regulate and limit the number of pods that may be generated and deployed in your environment.","breadcrumb":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/#primaryimage","url":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/K8s-security-tool-blog-Featured-Image-3.jpg","contentUrl":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/04\/K8s-security-tool-blog-Featured-Image-3.jpg","width":1001,"height":560},{"@type":"BreadcrumbList","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/04\/26\/pod-security-standards-pss\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/onlineappsdba.com\/"},{"@type":"ListItem","position":2,"name":"\ud835\udc0f\ud835\udc28\ud835\udc1d \ud835\udc12\ud835\udc1e\ud835\udc1c\ud835\udc2e\ud835\udc2b\ud835\udc22\ud835\udc2d\ud835\udc32 \ud835\udc12\ud835\udc2d\ud835\udc1a\ud835\udc27\ud835\udc1d\ud835\udc1a\ud835\udc2b\ud835\udc1d\ud835\udc2c (\ud835\udc0f\ud835\udc12\ud835\udc12): \ud835\udc00\ud835\udc25\ud835\udc25 \ud835\udc18\ud835\udc28\ud835\udc2e \ud835\udc0d\ud835\udc1e\ud835\udc1e\ud835\udc1d \ud835\udc2d\ud835\udc28 \ud835\udc0a\ud835\udc27\ud835\udc28\ud835\udc30"}]},{"@type":"WebSite","@id":"https:\/\/onlineappsdba.com\/#website","url":"https:\/\/onlineappsdba.com\/","name":"","description":"Oracle Implementation &amp; Training Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/onlineappsdba.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb","name":"Masroof Ahmad","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g","caption":"Masroof Ahmad"},"url":"https:\/\/onlineappsdba.com\/index.php\/author\/masroof\/"}]}},"_links":{"self":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts\/18062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/comments?post=18062"}],"version-history":[{"count":0,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts\/18062\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/media\/18063"}],"wp:attachment":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/media?parent=18062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/categories?post=18062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/tags?post=18062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}