You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Containers SHOULD not be able to change their file system at runtime.
This requirement must be implemented organizationally.
Note: By default, Red Hat recommends building containers so that the runtime UID does not have write permissions in the container. If the file system is changed (e.g. for a file system-based cache), this change will be lost when you restart, as the unchangeable image will be loaded again.
File systems SHOULD not be mounted with write permissions.
By default, local file systems are not mounted in containers. Containers access PVs that are integrated via OpenShift. This fulfills the requirement. Alternatively, ephemeral volumes can be used as volatile storage.
The container's root file system can be restricted to ReadOnly via the SecurityContext. Verification of this configuration can be carried out using ACS.
For section 1, I totally agree with the pasted block and will use it 1:1.
For section 2, I would also suggest organizational implemention. However, I would lay the focus more on the ReadOnly via Security context AND the readOnly option on volumeMounts.
No description provided.
The text was updated successfully, but these errors were encountered: