Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Helm chart security compliance #203

Open
manuelstein opened this issue Sep 1, 2023 · 3 comments
Open

Helm chart security compliance #203

manuelstein opened this issue Sep 1, 2023 · 3 comments

Comments

@manuelstein
Copy link

Policy-agent deployment should include runAsNonRoot: true:

securityContext:

Also, the seccomp profile type is missing, e.g. `spec.securityContext.seccompProfile.type: "RuntimeDefault"

@waleedhammam
Copy link
Contributor

Hey @manuelstein I have a couple of questions

Why do we need it to run as a root ? I think this would give full privileges within the container, potentially allowing them to perform actions that could harm the host system or other containers meanwhile the policy-agent doesn't need host-level access. It doesn't mount any volumes / change network settings .. etc

Also about spec.securityContext.seccompProfile.type: "RuntimeDefault" I think it's by default taking the default profile that applies to the containers that's provided by the container runtime unless there's a custom profile with some security requirements

@manuelstein
Copy link
Author

No, the setting is called runAsNonRoot.

Currently, the Helm chart does not comply with https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted

Also, please check the recommendations on the seccompProfile following the link.

@waleedhammam
Copy link
Contributor

Ah read it wrongly, it’s currently using user 1000 (non root). Will revisit the chart 👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants