Uploaded image for project: 'External Secrets Operator for Red Hat OpenShift'
  1. External Secrets Operator for Red Hat OpenShift
  2. ESO-71

Configure containers to set readOnlyRootFilesystem to true

XMLWordPrintable

    • Icon: Epic Epic
    • Resolution: Done
    • Icon: Normal Normal
    • None
    • None
    • None
    • Configure containers to set readOnlyRootFilesystem to true
    • BU Product Work
    • False
    • Hide

      None

      Show
      None
    • False
    • Done
    • OCPSTRAT-2045 - Configure containers to set readOnlyRootFilesystem to true [starting in OCP 4.20]
    • OCPSTRAT-2045Configure containers to set readOnlyRootFilesystem to true [starting in OCP 4.20]
    • 0% To Do, 0% In Progress, 100% Done
    • Program Call

      ESO containers should have setting readOnlyRootFilesystem set to True in all cases unless there is a specific reason not to.

      • Evaluate ESO containers and ensure this setting can be applied
      • Apply readOnlyRootFilesystem = True
      • If setting the above is NOT possible, draft explicit reasons as to why for prod sec team

      ------ From Linked OCPSTRAT ------

      Red Hat Product Security recommends that pods be deployed with readOnlyRootFilesystem set to true in the SecurityContext, but does not require it because a successful attack can only be carried out with a combination of weaknesses and OpenShift runs with a variety of mitigating controls. 

      However, customers are increasingly asking questions about why pods from Red Hat, and deployed as part of OpenShift, do not follow common hardening recommendations. 

      Note that setting readOnlyRootFilesystem to true ensures that the container's root filesystem is mounted as read-only. This setting has nothing to do with host access. 

      For more information, see 
      https://kubernetes.io/docs/tasks/configure-pod-container/security-context/

      Setting the readOnlyRootFilesystem flag to true reduces the attack surface of your containers, preventing an attacker from manipulating the contents of your container and its root file system.

      If your container needs to write temporary files, you can specify the ability to mount an emptyDir in the Security Context for your pod as described here. https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod 

              rhn-gps-jasee Jacob See
              rh-ee-npng Nick Png
              Jia Fan Jia Fan
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: