Create a policy to detect 'oc debug' #108
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Adds a new policy to detect attempts to access pods using
oc debug
.Note that
oc debug
doesn't invokekubectl exec
or similar commands to access the pod, instead creating a newdebug
pod configured the same as the original pod. For this reason we need to look at process activity inside pods (that look like/bin/sh
or/bin/bash
), and account for the ability of users to customise the shell viaoc debug --shell
.Ideally we would distinguish this activity based on pod name or pod annotations like
debug.openshift.io/source-container
, but this is not currently possible for runtime policies. Instead we label this as "Possible oc debug activity", and guide users towards the OpenShift audit logs for validation.