Minimize hostIPC
Description
Pods should not use hostIPC (shares Inter-Process Communication with host).
⚠️ Risk Impact
hostIPC allows pod processes to communicate with host processes via shared memory + semaphores — bypasses container isolation.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as high-severity findings with remediation guidance.
🔧 Remediation
Remove hostIPC: true from PodSpecs. Enforce via Pod Security admission.
💀 Real-World Attack Scenario
A debugging container ran with hostIPC for shared memory access. Compromise enabled the container to read shared-memory regions of host processes — including credential material in host process memory.
💰 Cost of Non-Compliance
Container-escape via hostIPC: rare but high-impact.
📋 Audit Questions
- 1.Any pods with hostIPC?
- 2.Justified?
- 3.PSS enforcement?
🎯 MITRE ATT&CK Mapping
⚡ Common Pitfalls
- ⛔Performance optimization via hostIPC
- ⛔Debug tools with hostIPC
📈 Business Value
hostIPC restriction maintains container isolation.
⏱️ Effort Estimate
Audit
EchelonGraph enforces via PSS
Automate CIS Kubernetes 5.2.3 compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →