5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions

Information

Enable default seccomp profile in your pod definitions.

Seccomp (secure computing mode) is used to restrict the set of system calls applications can make, allowing cluster administrators greater control over the security of workloads running in the cluster. Kubernetes disables seccomp profiles by default for historical reasons. You should enable it to ensure that the workloads have restricted actions available within the container.

Solution

For any non-privileged pods or containers that do not have seccomp profiles, consider using the RuntimeDefault or creating a custom seccomp profile specifically for the workload.

Please refer to the OpenShift

documentation

for working with custom seccomp profiles.

Impact:

If the default seccomp profile is too restrictive for you, you will need to create and manage your own seccomp profiles, which can be done using

OpenShift Security Context Constraints

and

custom seccomp profiles

.

See Also

https://workbench.cisecurity.org/benchmarks/19464

Item Details

Category: CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

References: 800-53|CM-2, 800-53|CM-6, 800-53|CM-7, 800-53|CM-7(1), 800-53|CM-9, 800-53|SA-3, 800-53|SA-8, 800-53|SA-10, CSCv7|5.2

Plugin: OpenShift

Control ID: 9d401d7f5029524ebd1df8c5ac7031a490af4e2205889356e4d6464486eb61a0