Replies: 6 comments 9 replies
-
Related issue for adding a best practice https://github.com/cncf/cnf-wg/issues/67 |
Beta Was this translation helpful? Give feedback.
-
Potential best practices related to the least privilege principle
|
Beta Was this translation helpful? Give feedback.
-
@wavell said (in https://github.com/cncf/cnf-wg/issues/67#issuecomment-886899047):
|
Beta Was this translation helpful? Give feedback.
-
CAP_NET_ADMIN is close to root access.
The capability in question is CAP_NET_RAW which allows direct access to
network traffic as raw IO. Pods can craft and receive packets arbitrarily
with this capability. All pods by default have this capability to respond
to icmp ping. This should be mitigated via seccomp or another police
enforcement framework.
On Mon, Jul 26, 2021 at 11:03 AM Taylor Carpenter ***@***.***> wrote:
@fkautz <https://github.com/fkautz> and @iawells
<https://github.com/iawells> have both mentioned CAP_NET_ADMIN as a
capability that can be problematic. A process in a container could cause
problems with network traffic in a Pod for instance.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<https://github.com/cncf/cnf-wg/discussions/28#discussioncomment-1052576>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AABBEGR64I6KPX76UY24ANLTZWPPHANCNFSM4UUCMYMQ>
.
--
--
Frederick F. Kautz IV
|
Beta Was this translation helpful? Give feedback.
-
Best Practices for Securing and Hardening Container Images: https://tanzu.vmware.com/developer/guides/containers/security-best-practices/
|
Beta Was this translation helpful? Give feedback.
-
Recommendation: Container should run in an unprivileged mode -> https://github.com/cncf/cnf-wg/discussions/25 |
Beta Was this translation helpful? Give feedback.
-
CNFs should always run with the least amount of privileges required to function properly
Reference:
from Kubernetes Security by Liz Rice, Michael Hausenblas
Related best practice ideas:
Beta Was this translation helpful? Give feedback.
All reactions