Source | Azure Portal | |||||||||
Display name | [Preview]: Sets Kubernetes cluster Pod securityContext.runAsUser fields to 1000, a non-root user id | |||||||||
Id | fe74a23d-79e4-401c-bd0d-fd7a5b35af32 | |||||||||
Version | 1.1.0-preview Details on versioning |
|||||||||
Versioning |
Versions supported for Versioning: 2 1.1.0-preview 1.0.0-preview Built-in Versioning [Preview] |
|||||||||
Category | Kubernetes Microsoft Learn |
|||||||||
Description | Reduces attack surface introduced by escalating privileges as root user in the presence of security vulnerabilities. | |||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
|||||||||
Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.0.0-preview' Repository: Azure-Policy fe74a23d-79e4-401c-bd0d-fd7a5b35af32 |
|||||||||
Mode | Microsoft.Kubernetes.Data | |||||||||
Type | BuiltIn | |||||||||
Preview | True | |||||||||
Deprecated | False | |||||||||
Effect | Default Mutate Allowed Mutate, Disabled |
|||||||||
RBAC role(s) | none | |||||||||
Rule aliases | none | |||||||||
Rule resource types | IF (1) |
|||||||||
Compliance | Not a Compliance control | |||||||||
Initiatives usage | none | |||||||||
History |
|
|||||||||
JSON compare |
compare mode:
version left:
version right:
|
|||||||||
JSON |
|