Kubernetes Labs
Explore 1 lab in Kubernetes.
A container in a pod by default runs with a number of unnecessary capabilities. This unnecessary privilege increases the cluster attack surface.
Carefully review the following default container capabilities and remove unnecessary ones.
[source]
"CAP_CHOWN",
"CAP_DAC_OVERRIDE",
"CAP_FSETID",
"CAP_FOWNER",
"CAP_MKNOD",
"CAP_NET_RAW",
"CAP_SETGID",
"CAP_SETUID",
"CAP_SETFCAP",
"CAP_SETPCAP",
"CAP_NET_BIND_SERVICE",
"CAP_SYS_CHROOT",
"CAP_KILL",
"CAP_AUDIT_WRITE",
Source: https://github.com/moby/moby/blob/master/oci/caps/defaults.go#L6-L19
An example of dropping all capabilities on a container
apiVersion: apps/v1
kind: Deployment
spec:
template:
spec:
containers:
- name: app
securityContext:
capabilities:
drop:
- ALL
Select a language to explore available labs for this vulnerability.
Try adjusting your language filter.
Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.
Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.
Read more