Privilege Escalation: Workload with shareProcessNamespace enabled

This document describes a threat finding type in Security Command Center. Threat findings are generated by threat detectors when they detect a potential threat in your cloud resources. For a full list of available threat findings, see Threat findings index.

Finding description

Someone deployed a workload with the shareProcessNamespace option set to true, allowing all containers to share the same Linux process namespace. This could allow an untrusted or compromised container to escalate privileges by accessing and controlling environment variables, memory, and other sensitive data from processes running in other containers. Some workloads might require this functionality to operate for legitimate reasons, such as log handling sidecar containers or debugging containers. For more details, see the log message for this alert.

  1. Confirm that the workload actually requires access to a shared process namespace for all containers in the workload.
  2. Check whether there are other signs of malicious activity by the principal in the audit logs in Cloud Logging.
  3. If the principal isn't a service account (IAM or Kubernetes), contact the owner of the account to confirm whether they conducted the action.
  4. If the principal is a service account (IAM or Kubernetes), identify the legitimacy of what caused the service account to perform this action.

What's next