Red Hat OpenShift security and compliance
As a cloud administrator on the Red Hat® OpenShift® Container Platform, you must ensure that your cluster allows authorized users access to the data and applications that they need. At the same time, you must protect the cluster from accidental or malicious access by granting only the minimal privileges to users and processes to restrict system calls and file system access.
You can use monitoring and compliance enforcement tools on your clusters to check that your
security policies are working the way that you expect them to work. You can also define a
ResourceQuota for each namespace to address common attack scenarios. A
ResourceQuota object can restrict the number of pods and the CPU consumption and in
doing so set hard limits on the amount of node resource usage.
- SECCOMP (Secure Computing Mode) profiles
-
On OpenShift Container Platform 4.11+, all containers now use the
RuntimeDefaultseccomp profile by default. TheRuntimeDefaultprofile provides a list of system calls that are allowed. For example, depending on your corporate policy, you might want to set the seccomp profile to beUnconfinedor create a customLocalhostprofile. However, your pods might fail if your custom profile is more restrictive than the default setting. To use a custom profile, complete the following steps.- Create a seccomp profile in
Machine Config. - Set the
seccomp_profile.typetoLocalhostforselected
pods in the custom resource, and assign the new profile (for example<my_profile>.json) to thelocalhost_profileparameter.seccomp_profile: type: 'Localhost' localhost_profile: 'profile/<my_profile>.json'The sc_seccomp_profile parameter can be set for all workloads in a deployment. Set the seccomp_profile at the component level to affect only that workload.
Learn more...
- Create a seccomp profile in
- Service account tokens
-
In Kubernetes, a
ServiceAccountis granted permissions to access Kubernetes APIs and is associated with one or more pods. Calling a Kubernetes API requires that aServiceAccounttoken is passed for authentication and authorization. For easy access to Kubernetes APIs, theServiceAccounttoken is mounted into all associated pods even though many pods have no requirement to call these APIs. Business Automation Workflow configures service accounts and pods to avoid automatically mounting theServiceAccounttoken to reduce attack surface.
This topic is shared by BAW, CP4BA. Last updated on 2025-01-20 10:38