Skip to content

Commit 6c7e95f

Browse files
committed
docs: Clarify this applies only if using Dyn Adm Con
Signed-off-by: Víctor Cuadrado Juan <vcuadradojuan@suse.de>
1 parent f6d3a0d commit 6c7e95f

1 file changed

Lines changed: 3 additions & 2 deletions

File tree

Standards/scs-0217-v1-cluster-hardening.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -316,8 +316,9 @@ via spoofing"_, NetworkPolicies and policy engine configuration doesn't suffice.
316316

317317
These threats involve intercepting traffic between the Kubernetes API server
318318
and the dynamic admission controller webhooks of the Policy Engine. To mitigate
319-
this, the Kubernetes API server MUST be configured with mutual TLS
320-
authentication for the Validating and Mutating Webhooks (see [Kubernetes
319+
this, if using a Dynamic Admission Controller such as a Policy Engine, the
320+
Kubernetes API server MUST be configured with mutual TLS authentication for the
321+
Validating and Mutating Webhooks (see [Kubernetes
321322
docs](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#authenticate-apiservers))
322323
. The Policy Engine MUST be able to authenticate the API server and MUST be
323324
configured with mutual TLS authentication for the

0 commit comments

Comments
 (0)