Skip to content

Security: Enable Pod Security Standards and container security contexts #2

@monadic

Description

@monadic

Priority: HIGH

Description

No pod security policies are configured, and 6/8 services run without security contexts. This allows containers to run as root and with unnecessary capabilities.

Impact

  • Containers running as root increase attack surface
  • No resource limits could lead to DoS
  • Missing security controls for compliance

Required Actions

  1. Add securityContext to all deployments:
    • runAsNonRoot: true
    • runAsUser: 1000
    • readOnlyRootFilesystem: true where possible
  2. Set resource limits on all containers
  3. Enable Pod Security Standards at namespace level
  4. Add readiness and liveness probes

Acceptance Criteria

  • All containers run as non-root
  • Resource limits defined for CPU and memory
  • Pod Security Standards enforced
  • Health probes configured

References

  • CIS Kubernetes Benchmark 5.3.2
  • Original finding in SECURITY-REVIEW.md

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions