Investigation
Treat the manifest as evidence of your production blast radius.
Safe investigation sequence:
- Inspect context fields: Check the pod and container-level
securityContextin the running cluster. - Confirm non-root status: Verify that the workload is actually running as a non-zero UID.
- Identify requirement: Determine the exact path or Linux capability the application actually needs.
- Fix the gap: Address the specific requirement (e.g., by adding an
emptyDirvolume) instead of widening the entire privilege model.
The goal is to fix the application without making it “soft.”
Containment
Containment means keeping the security baseline intact even during emergency repairs.
Containment steps:
- Preserve non-root: Do not switch to root execution to bypass permission errors.
- Add targeted volumes: Use explicit writable volumes for only the paths that need them.
- Keep escalation disabled: Ensure
allowPrivilegeEscalationremainsfalse. - Verify baseline: Confirm the workload still passes security checks after the fix is applied.
Pause and Predict: What automated guardrail would have prevented this incident entirely?