Government of British ColumbiaGovernment of British Columbia




Information and Application Security

Resources to help teams ensure their applications appropriately design for and manage security in the their code, tools, and processes.

Quick Start


While it is strongly advised to create meaningful bespoke application identities, and accompanying NetworkSecurityPolicy (NSP) to secure your project, there are circumstances where a more open policy are desired. For the purpose of this document this will be referred to as an Open Security Model (OSM).

The sections below will guide you through adding sufficient policy to:

  • Allow all Pods to talk to the Internet (Any Network);
  • Allow all Pods to talk to one another within a namespace;
  • Allow your namespace to talk to the OpenShift Container Platform (OCP) API.

🤓 ProTip

  • 🚫 Use this technique sparingly. Its ill advised to circumvent security best practices.
  • Use this resource to create bespoke NSPs.


Check to see if you have any existing NSP. The best and most simple way to view your existing NSP is to use the oc command line interface. Run the following command to see installed policy:

oc get networksecuritypolicy

If don't have any existing policy, no results will appear. If you do already have NSP continue reading to understand how the OSM policy is named so you can determine if its already been applied.

NAME                    AGE

Go to the samples directory accompanying this document where you'll find the manifest file quickstart-nsp.yaml. This manifest contains the three base policies needed to implement our open security model.

egress-internetAllow Pods to communicate with the Internet.
int-cluster-k8s-api-permitAllow Pods to communicate to the k8s API; this is needed for deployments.
intra-namespace-commsAllow Pods to communicate amongst themselves within a namespace.

Edit the YAML file replacing the namespace devops-platform-security-demo with the name of the namespace you intend to install the NSP. If you're not sure of the exact name use the oc project command to find out what project you're using.

oc project

Shows a result similar to the following:

Using project "devex-von-tools" on server "".

Once you have edited the policy replaceing the namespace then apply the policy as follows:

oc apply -f samples/quickstart-nsp.yaml

NOTE It make take a few moments for your security policy to take effect.

Again, list your NSP. This time you should see three policies have been added.

oc get networksecuritypolicy

This command produces the following result:

NOTE If you have NSP that was setup to allow backwards compatibility the name may have the namespace postfix appended to it.

NAME                                AGE
egress-internet                     1d
int-cluster-k8s-api-permit          1d
intra-namespace-comms               1d

You can inspect a policy by fetching it in YAML format with the following command:

oc get networksecuritypolicy egress-internet -o yaml

The results are quite detailed, but the part you mainly need to be aware of is the spec (excerpt shown below.)

  description: |
    allow devex-von-tools to talk to the internet
  - - ext:network=any
  - - $namespace=devex-von-tools
  • Create an Issue

Information and Application Security