github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/avd_docs/google/gke/AVD-GCP-0047/docs.md (about) 1 2 By default, Pods in Kubernetes can operate with capabilities beyond what they require. You should constrain the Pod's capabilities to only those required for that workload. 3 4 Kubernetes offers controls for restricting your Pods to execute with only explicitly granted capabilities. 5 6 Pod Security Policy allows you to set smart defaults for your Pods, and enforce controls you want to enable across your fleet. 7 8 The policies you define should be specific to the needs of your application 9 10 ### Impact 11 Pods could be operating with more permissions than required to be effective 12 13 <!-- DO NOT CHANGE --> 14 {{ remediationActions }} 15 16 ### Links 17 - https://cloud.google.com/kubernetes-engine/docs/how-to/hardening-your-cluster#admission_controllers 18 19