In this article, we explore Pod Security Admission (PSA) and Pod Security Standards as defined in Kubernetes Enhancement Proposal KEP-2579. PSA is designed to replace Pod Security Policies (PSP) with a solution that is safe to enable on new clusters, easy to use, and highly extensible. This approach meets several key requirements outlined in the proposal.Documentation Index
Fetch the complete documentation index at: https://notes.kodekloud.com/llms.txt
Use this file to discover all available pages before exploring further.

There are three built-in profiles provided by the Pod Security Standards:
- Privileged: Offers nearly no restrictions, allowing extensive permissions and potential privilege escalation.
- Baseline: Balances security and functionality by preventing unauthorized privilege escalation while supporting most containerized applications.
- Restricted: Implements strict security measures based on pod hardening best practices, ensuring high security at the cost of potential compatibility challenges.
- enforce: Rejects pod creation requests that do not comply with the specified policy.
- audit: Allows pod creation but logs the policy violation in the audit logs.
- warn: Permits pod creation and issues a warning to the user regarding the policy violation.



| Namespace | Mode | Profile | Description |
|---|---|---|---|
| payroll | enforce | restricted | Pods must strictly adhere to the restricted policy. |
| hr | enforce | baseline | Pods are expected to follow baseline security practices. |
| dev | warn | restricted | Pods receive warnings if they do not comply with the restricted policy. |
We encourage you to experiment with Pod Security Admission and Pod Security Standards to better understand how they enhance security in Kubernetes clusters. For additional information, visit the Kubernetes Documentation.