Impact & Risk Analysis
- Severity: Medium (Level 2 - Defense in Depth)
- CIS Benchmark: CIS 5.6.2
- Impact: Unrestricted Kernel Access. Seccomp (Secure Computing Mode) acts as a firewall for system calls. Without it (the default
unconfinedstate), a container process can make any system call to the kernel. If a container is compromised, the attacker can use obscure or dangerous system calls to bypass isolation mechanisms.
Common Misconfiguration
Omitting theseccompProfile field in the Pod spec. Historically, Kubernetes disabled seccomp by default to ensure maximum compatibility, meaning most legacy manifests are vulnerable unless explicitly updated.
Vulnerable Example
Secure Example
Audit Procedure
Review the pod definitions in your cluster to ensure they explicitly enable the default profile.- Result: The output should show
RuntimeDefault(orLocalhostif using a custom profile). - Fail: If the output is empty or shows
Unconfined.
Remediation
Update your Pod, Deployment, and DaemonSet manifests to include theseccompProfile in the securityContext.
RuntimeDefault breaks your application (e.g., it needs specific blocked syscalls), you may need to define a custom profile (type: Localhost) instead of reverting to Unconfined.
