Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Eliminate the root user from podtracer image by minimizing access #34

Open
acmenezes opened this issue Feb 15, 2022 · 0 comments
Open
Labels
enhancement New feature or request

Comments

@acmenezes
Copy link
Collaborator

In order to reduce the attack surface on podtracer deployments find the smallest viable set of permissions for podtracer container and eliminate the root user from there. That means that we may need to run a capability aware container that can raise capabilities from the code itself escalating privileges or temporarily using file caps that can work with the restricted SCC. This is a tough one to try.

@acmenezes acmenezes added the enhancement New feature or request label Feb 15, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant