Skip to content

Commit fce75f8

Browse files
committed
docs: Mention static pods in the security guidance around api access
We recommend against providing access to the API socket from containers because of the effects it can have on system configuration and security. This change specifically calls out the ability to define static pods as an action that could be taken with API access, and the effects of doing so.
1 parent 3f0c580 commit fce75f8

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

SECURITY_GUIDANCE.md

+2
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,8 @@ It is labeled `api_socket_t`, so only processes with privileged SELinux labels c
7171
Write access to this socket will grant full control over system configuration.
7272
This includes the ability to define an arbitrary source for a host container, and to run that container with "superpowers" that bypass other restrictions.
7373
These "superpowers" are described [below](#limit-use-of-host-containers).
74+
For Kubernetes variants, it also includes the ability to define and run static pods.
75+
These are managed directly by `kubelet` and are not subject to admission controllers that enforce security policies for the cluster.
7476

7577
We recommend blocking access to the API socket from containers managed by the orchestrator.
7678
The "control" host container can be used to modify settings when needed.

0 commit comments

Comments
 (0)