Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ApparmorProfile CRD should be a cluster-wide resource #2582

Open
ccojocar opened this issue Nov 22, 2024 · 1 comment
Open

ApparmorProfile CRD should be a cluster-wide resource #2582

ccojocar opened this issue Nov 22, 2024 · 1 comment
Labels
kind/feature Categorizes issue or PR as related to a new feature.

Comments

@ccojocar
Copy link
Contributor

What would you like to be added:

The ApparmorProfile CRD should be cluster-wide scope, and not namespaced. I would argue that also SeccompProfile should be the same.

The Profile CRDs are currently namespaced and there are a number of issues with this:

  • apparmor profile during the installation, it gets loaded into the Linux kernel of each ndoe, and it is cluster-wide available, any pod can reference it into the security context.
  • There isn't any mechanism in the security context to allow name-spacing the secruity profiles.
  • It is possible currently to overwrite a profile from one namesapce with another profile created in a different namesapce if both profiles have the same name. This can be used to preform cross namespaces attacks. For instance a less permissive profile gets overwritten by a profile with more privileges from a different namespace even though the profile creator doesn't have permissions to do so in the original namesspace.

Why is this needed:

This will enhance the security and make it more transparent to RBAC policies that actually this profiles are cluster-wide.

@ccojocar ccojocar added the kind/feature Categorizes issue or PR as related to a new feature. label Nov 22, 2024
@ccojocar
Copy link
Contributor Author

cc @mhils

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Categorizes issue or PR as related to a new feature.
Projects
None yet
Development

No branches or pull requests

1 participant