OpenShift, developed by Red Hat, is a Kubernetes-based container platform tailored for enterprise use. It extends Kubernetes with integrated developer tools, monitoring, security policies, and robust multi-cloud support. OpenShift’s enterprise-grade features make it particularly suited for organizations with complex compliance and operational requirements.
OpenShift is designed for organizations needing secure, scalable, and compliant infrastructure. Typical adopters include:
Adapting RAD Security’s runtime anomaly detection capabilities for OpenShift required significant engineering effort, particularly around its container runtime, security policies, and access controls.
OpenShift uses CRI-O as its default container runtime, diverging from Docker or containerd used in many Kubernetes environments. To support CRI-O, we:
OpenShift enforces SecurityContextConstraints (SCC) as part of its security model. SCCs define the permissions and restrictions applied to pods, including:
Why SCCs Are Important
Unlike Kubernetes’ PodSecurityPolicies (PSPs) or Pod Security Standards, SCCs provide a finer level of control tailored to OpenShift. For an eBPF-based agent like ours, adapting to SCCs was critical to maintain functionality while adhering to OpenShift’s stricter security boundaries.
What We Changed
To integrate with SCCs, we needed permissions for:
Balancing Security and Functionality
SCCs are stringent for a reason: they limit attack vectors by controlling privileged operations. However, our anomaly detection relies on host-level access to monitor runtime events effectively. We worked closely with OpenShift’s security model to:
What is hostPID?
The hostPID setting allows a pod to share the process namespace of the host node. When enabled, containers in the pod can view and interact with all processes running on the host, not just within the container.
Why Does the eBPF Agent Require hostPID?
To provide comprehensive runtime anomaly detection, our eBPF-based agent needs visibility into system-level activity, including:
Navigating SCC Restrictions
By default, SCCs prohibit hostPID due to its elevated privileges, which could be exploited if a pod is compromised. To safely enable it, we:
OpenShift provides a more granular RBAC system compared to Kubernetes, allowing precise control over user and service account permissions. This required:
By integrating with OpenShift’s RBAC, we ensured our agent could operate securely while maintaining compliance with its advanced access control mechanisms.
Expanding support for OpenShift demonstrates RAD Security’s commitment to delivering robust security solutions across diverse Kubernetes environments. Adapting to OpenShift’s unique requirements, such as CRI-O, SCCs, and RBAC, was essential to ensure our runtime anomaly detection provides the same depth of coverage and reliability that customers expect.
With OpenShift support, organizations can confidently adopt this powerful platform while maintaining secure, compliant, and scalable workloads.