kubescape-c-0055-linux-hardening
In order to reduce the attack surface, it is recommend, when it is possible, to harden your application using security services such as SELinux®, AppArmor®, and seccomp. Starting from Kubernetes version 22, SELinux is enabled by default.
- Not Configurable
- CronJob
- DaemonSet
- Deployment
- Job
- Pod
- ReplicaSet
- StatefulSet
This Policy checks if there is AppArmor
or Seccomp
or SELinux
or Capabilities
are defined in the securityContext
of container and pod. If none of these fields are defined for both the container and pod in workload, the resource is denied from being deployed in the cluster.