allowPrivilegeEscalation false
Description
Restricted level requires allowPrivilegeEscalation:false on every container.
⚠️ Risk Impact
Allowing privilege escalation enables setuid binaries + capability escalation within container.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as high-severity findings with remediation guidance.
🔧 Remediation
Set securityContext.allowPrivilegeEscalation:false on all containers.
💀 Real-World Attack Scenario
Container with allowPrivilegeEscalation:true ran setuid binary. Compromised, escalated to root within container despite non-root runAsUser.
💰 Cost of Non-Compliance
Container-escape: $4M+ avg.
📋 Audit Questions
- 1.allowPrivilegeEscalation:false on all containers?
🎯 MITRE ATT&CK Mapping
⚡ Common Pitfalls
- ⛔Default true left in place
📈 Business Value
Preventing privilege escalation limits container-escape probability.
⏱️ Effort Estimate
Per-deployment
EchelonGraph enforces via PSS
🔗 Cross-Framework References
Automate Pod Security Standards PSS-AllowPrivilegeEscalation compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →