Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or enforcing pod security standards.
79
68%
Does it follow best practices?
Impact
95%
1.21xAverage score across 3 eval scenarios
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./tests/ext_conformance/artifacts/agents-wshobson/kubernetes-operations/skills/k8s-security-policies/SKILL.mdNetworkPolicy defense-in-depth
Default-deny-all policy
100%
100%
DNS allowance
100%
100%
Tier labels in ingress selectors
0%
100%
Tier labels in target selectors
0%
100%
Metadata service blocked
0%
100%
Combined cross-namespace selector
100%
100%
No unrestricted allow-all
0%
100%
Port specificity
50%
100%
RBAC least-privilege configuration
Role not ClusterRole
100%
100%
No wildcard verbs
100%
100%
No wildcard resources
100%
100%
resourceNames restriction
0%
0%
Dedicated ServiceAccount
100%
100%
Token auto-mount disabled
100%
100%
RoleBinding to ServiceAccount
100%
100%
Minimal verbs
100%
100%
Pod security hardening
PSS enforce label
100%
100%
PSS audit label
100%
100%
PSS warn label
100%
100%
runAsNonRoot set
100%
100%
runAsUser set
100%
100%
fsGroup set
100%
100%
seccompProfile set
100%
100%
No privilege escalation
100%
100%
Read-only filesystem
100%
100%
All capabilities dropped
100%
100%
47823e3
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.