Impact & Risk Analysis
- Severity: High
- CIS Benchmark: CIS 5.2.4
- Impact: Shared Memory Attacks & Data Leakage. The IPC (Inter-Process Communication) namespace controls access to shared memory segments and semaphores. A container running in the host’s IPC namespace (
hostIPC: true) can read or write to the shared memory of the host or other processes. This allows an attacker to potentially access sensitive data (like database credentials in memory) or crash other applications.
Common Misconfiguration
EnablinghostIPC: true for high-performance applications (like databases or scientific computing) that claim to need direct memory access, without understanding the security implications.
Vulnerable Example
Secure Example
Audit Procedure
Run the following command to check for pods using the host IPC namespace:- Result: The output will list the pod name followed by its
hostIPCsetting. - Fail: If you see
truefor any pod that is not specifically authorized.
Remediation
Add policies to each namespace in the cluster which has user workloads to restrict the admission ofhostIPC containers.
Using Pod Security Admission:
Apply the baseline or restricted profile to your namespaces. Both profiles strictly forbid hostIPC: true.

