Prohibit Root Containers in PMK Clusters

Problem

  • Self Service Users are able to create pods with root containers in PMK
  • If mounted with the critical volume mounts like / , these pods can cause a serious security threat to the host and the underlying filesystem

Environment

  • Platform9 Managed Kubernetes - v5.6 and Higher

Answer

  • Platform9 is aware of this issue and an RFE is already in place for the same issue with ID: PMK-6540

Additional Information

  • Ensure the below criteria for all the applications

Mount Only Necessary Directories: If your application needs access to specific host directories, mount only those directories rather than the entire root filesystem.

Use Read-Only Mounts: If the container only needs to read data from the host, use a read-only mount to prevent any modifications.

Run as Non-Root User: Configure the container to run as a non-root user to limit its privileges within the container and on the host.

Apply Security Policies: Use Kubernetes security policies to enforce constraints on what containers can do, including restricting the host paths they can access.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard