Skip to content

Commit

Permalink
docs: Mention static pods in the security guidance around api access
Browse files Browse the repository at this point in the history
We recommend against providing access to the API socket from containers
because of the effects it can have on system configuration and security.
This change specifically calls out the ability to define static pods as
an action that could be taken with API access, and the effects of doing
so.
  • Loading branch information
zmrow committed Oct 1, 2021
1 parent 3f0c580 commit fce75f8
Showing 1 changed file with 2 additions and 0 deletions.
2 changes: 2 additions & 0 deletions SECURITY_GUIDANCE.md
Original file line number Diff line number Diff line change
Expand Up @@ -71,6 +71,8 @@ It is labeled `api_socket_t`, so only processes with privileged SELinux labels c
Write access to this socket will grant full control over system configuration.
This includes the ability to define an arbitrary source for a host container, and to run that container with "superpowers" that bypass other restrictions.
These "superpowers" are described [below](#limit-use-of-host-containers).
For Kubernetes variants, it also includes the ability to define and run static pods.
These are managed directly by `kubelet` and are not subject to admission controllers that enforce security policies for the cluster.

We recommend blocking access to the API socket from containers managed by the orchestrator.
The "control" host container can be used to modify settings when needed.
Expand Down

0 comments on commit fce75f8

Please sign in to comment.