Skip to content

Commit

Permalink
fixup! Fix small mistakes
Browse files Browse the repository at this point in the history
Signed-off-by: Hannes Baum <[email protected]>
  • Loading branch information
cah-hbaum committed Nov 20, 2023
1 parent 2aaded6 commit 5734b98
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions Standards/scs-0216-v1-high-security-setup.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ Nevertheless, a provider (or even a customer) needs to take action in order to a
hardened, secure cluster due to the myriad of configurations possible. This is especially
the case since Kubernetes ships with insecure features and configurations out of the box,
which will need to be mitigated by an administrator with the proper knowledge.
Hardened, secure Kubernetes clusters are desirable regardless of the possible threat model,
Hardened, secure Kubernetes clusters are desirable regardless of the possible threat model,
since higher security doesn't necessarily mean higher complexity in this case.

## Motivation
Expand Down Expand Up @@ -111,7 +111,7 @@ Multiple policies can be setup to limit and control the capabilities of workload
especially in order to prevent malicious actors from exploiting obvious faults or even to
just prevent incorrectly configured workloads from overusing resources.

An easy way to do this would be Resource Limiting on a cluster. This can be done on a per-namespace
An easy way to do this would be Resource Limiting on a cluster. This can be done on a per-namespace
basis and can prevent the overuse of resources or even prevent the creation of too many pods, services or volumes.

It is also possible to change the security context of a pod, which changes different settings of a pod, like
Expand Down

0 comments on commit 5734b98

Please sign in to comment.