Back to all scenarios
Scenario #281
Security
Kubernetes v1.21, On-Prem Cluster

Misconfigured PodSecurityPolicy Allowed Privileged Containers

Pods were running with privileged: true due to a permissive PodSecurityPolicy (PSP) left enabled during testing.

Find this helpful?
What Happened

Developers accidentally left a wide-open PSP in place that allowed privileged containers, host networking, and host path mounts. This allowed a compromised container to access host files.

Diagnosis Steps
  • 1Audited active PSPs.
  • 2Identified a PSP with overly permissive rules.
  • 3Found pods using privileged: true.
Root Cause

Lack of PSP review before production deployment.

Fix/Workaround
• Removed the insecure PSP.
• Implemented a restrictive default PSP.
• Migrated to PodSecurityAdmission after PSP deprecation.
Lessons Learned

Security defaults should be restrictive, not permissive.

How to Avoid
  • 1Review PSP or PodSecurity configurations regularly.
  • 2Implement strict admission control policies.