Skip to content

Restrict container runtime using LSM

Info

ID: MS-M9011
MITRE mitigation: M1038, M1040

Restrict the running environment of the containers using Linux security modules, such as AppArmor, SELinux, Seccomp and others. Linux security modules can restrict access to files, running processes, certain system calls and others. Also, dropping unnecessary Linux capabilities from the container runtime environment helps reduce the attack surface of such container.

Techniques Addressed by Mitigation

ID Name Use
MS-TA9006 Exec into container Restrict container runtime capabilities using LSM.
MS-TA9007 Bash or Cmd inside container Restrict container runtime capabilities using LSM.
MS-TA9009 Application exploit (RCE) Restrict container runtime capabilities using LSM.
MS-TA9010 SSH server running inside container Limit which process can open network socket on a container.
MS-TA9013 Writable hostPath mount Use AppArmor to restrict file writing.
MS-TA9039 Resource hijacking Restrict execution of unwanted processes in containers.
MS-TA9040 Denial of service Restrict execution of unwanted processes in containers.