Restrict hostProcess
Description
Pods should not set hostProcess: true (Windows-specific privilege escalation).
⚠️ Risk Impact
hostProcess pods run with Windows host privileges, bypassing pod isolation entirely.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as high-severity findings with remediation guidance.
🔧 Remediation
Remove hostProcess flag. Enforce via Pod Security admission (Baseline level prevents).
💀 Real-World Attack Scenario
A Windows K8s cluster ran a 'monitoring agent' with hostProcess:true. Compromised agent had full Windows host access — including ability to install rootkits + extract LSASS secrets.
💰 Cost of Non-Compliance
hostProcess pods are rare; when exploited, full host compromise.
📋 Audit Questions
- 1.Any pods with hostProcess?
- 2.Justified?
- 3.PSS enforcement at Baseline level?
🎯 MITRE ATT&CK Mapping
⚡ Common Pitfalls
- ⛔Windows admin tools using hostProcess for convenience
📈 Business Value
Eliminating hostProcess closes a Windows-specific privilege escalation.
⏱️ Effort Estimate
Audit + remediate
EchelonGraph enforces via PSS
Automate CIS Kubernetes 5.2.2 compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →