Pod security policy enforcement not defined.

Explanation

By default, Pods in Kubernetes can operate with capabilities beyond what they require. You should constrain the Pod’s capabilities to only those required for that workload.

Kubernetes offers controls for restricting your Pods to execute with only explicitly granted capabilities.

Pod Security Policy allows you to set smart defaults for your Pods, and enforce controls you want to enable across your fleet.

The policies you define should be specific to the needs of your application

Possible Impact

Pods could be operating with more permissions than required to be effective

Suggested Resolution

Use security policies for pods to restrict permissions to those needed to be effective

Insecure Example

The following example will fail the google-gke-enforce-pod-security-policy check.

resource "google_container_cluster" "bad_example" {
	pod_security_policy_config {
        enabled = "false"
	}
}

Secure Example

The following example will pass the google-gke-enforce-pod-security-policy check.

resource "google_container_cluster" "good_example" {
	pod_security_policy_config {
        enabled = "true"
	}
}

Getting Started
Provider Checks
Config
GitHub Actions