Ensure that containers are prohibited from being admitted if they have "hostIPC" set to true. The "hostIPC" flag should be restricted because it allows containers to share the host operating system's Inter-Process Communication (IPC) namespace.
Containers running in the host's IPC namespace can use IPC mechanisms to interact with processes on the host. To prevent this security risk, define an admission control policy that prevents containers from sharing the host IPC namespace. If hostIPC: true is necessary for specific containers, implement a separate, restricted policy. Access to this permissive policy must be strictly controlled, allowing only limited service accounts and users.
Audit
To determine if the containers are permitted to operate with the "hostIPC" flag set to true, perform the following operations:
Remediation / Resolution
To ensure that containers are not permitted to run with the "hostIPC" flag set to true, perform the following operations:
References
- Oracle Cloud Infrastructure Documentation
- Overview of Kubernetes Engine (OKE)
- Managing Kubernetes Clusters
- Setting Up Cluster Access
- Accessing a Cluster Using Kubectl
- About Access Control and Kubernetes Engine (OKE)
- Oracle Cloud Infrastructure CLI Documentation
- compartment list
- cluster list
- cluster create-kubeconfig
- Kubernetes Documentation
- Using RBAC Authorization