rook/cassandra

Reduce Cassandra pod privileges to a minimum

vishwaskumar58 opened this issue · 6 comments

Is this a bug report or feature request?

  • Feature Request

What should the feature do:
Reduce the privileges available to cassandra pods to the bare minimum to eliminate security vulnerabilities.

What is use case behind this feature:
Security hardening.

It would be great to pass securityContext to all cassandra nodes from Cluster resource and the rook-install initContainer .

stale commented

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in a week if no further activity occurs. Thank you for your contributions.

stale commented

This issue has been automatically closed due to inactivity. Please re-open if this still requires investigation.

I have the same issue. Can we reopen this issue?

I am having same issue, we need this to eliminate security vulnerabilities.
(CIS_Docker_CE_v1.1.0 - 5.25) Restrict container from acquiring additional privileges

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in a week if no further activity occurs. Thank you for your contributions.

This issue has been automatically closed due to inactivity. Please re-open if this still requires investigation.