contributions icon indicating copy to clipboard operation
contributions copied to clipboard

Create a policy to detect 'oc debug'

Open shaneboulden opened this issue 4 months ago • 0 comments

Adds a new policy to detect attempts to access pods using oc debug.

Note that oc debug doesn't invoke kubectl exec or similar commands to access the pod, instead creating a new debug pod configured the same as the original pod. For this reason we need to look at process activity inside pods (that look like /bin/sh or /bin/bash), and account for the ability of users to customise the shell via oc debug --shell.

Ideally we would distinguish this activity based on pod name or pod annotations like debug.openshift.io/source-container, but this is not currently possible for runtime policies. Instead we label this as "Possible oc debug activity", and guide users towards the OpenShift audit logs for validation.

shaneboulden avatar Sep 28 '24 02:09 shaneboulden