-
Feature
-
Resolution: Unresolved
-
Major
-
None
Red Hat Product Security recommends that pods be deployed with readOnlyRootFilesystem set to true in the SecurityContext, but does not require it because a successful attack can only be carried out with a combination of weaknesses and OpenShift runs with a variety of mitigating controls.
However, customers are increasingly asking questions about why pods from Red Hat, and deployed as part of OpenShift, do not follow common hardening recommendations.
Note that setting readOnlyRootFilesystem to true ensures that the container's root filesystem is mounted as read-only. This setting has nothing to do with host access.
For more information, see
https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
Setting the readOnlyRootFilesystem flag to true reduces the attack surface of your containers, preventing an attacker from manipulating the contents of your container and its root file system.
Requirements (aka. Acceptance Criteria):
- Impact assessment: Investigate the impact of enforcing `readOnlyRootFilesystem: true` on Bare metal.
- Implementation (or Justification): Implement the necessary changes to enforce `readOnlyRootFilesystem: true` by default. For any instances where `readOnlyRootFilesystem: false` is required, provide clear and concise explanations outlining the specific use cases and justifications.
- links to