🎄 Join our Annual Holiday wargame and win prizes!


AppArmor Disabled

AppArmor, short for Application Armor, is a Linux kernel security module that provides mandatory access controls for processes, restricting the actions they can perform. In the context of Kubernetes, enabling AppArmor adds an extra layer of security to cluster. AppArmor uses profiles to define what resources and capabilities a specific application or process is allowed to access. AppArmor can enforce stricter security policies on containers, preventing them from accessing unauthorised resources or performing malicious actions.

Remediation

The following example enforces default AppArmor profile on app container.

apiVersion: apps/v1
kind: Deployment
spec:
  template:
    metadata:
      annotations:
        container.apparmor.security.beta.kubernetes.io/myContainer: runtime/default
    spec:
      containers:
      - name: app

Metadata

  • Severity: informational
  • Slug: apparmor-disabled

CWEs

  • 250: Execution with Unnecessary Privileges

OWASP

  • A05:2021: Security Misconfiguration

Available Labs

Open Kubernetes labs in SecDim Play for this vulnerability.

Deco line
Deco line

Play AppSec WarGames

Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.

Deco line
Deco line

Got a comment?

Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.

Read more