You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I can't find any reference to preventing writes to /dev/shm/ in MITRE either. The /dev/shm/ is a common IPC mechanism in Linux for shared memory between processes. Preventing writes to it would interfere with some applications.
The only thing I can find about /dev/shm/ in MITRE execution is about preventing execve(2) from unusual places like /dev/shm/. If that is what the original intent of this policy was, then perhaps a better rule is to prevent execution of files located in the /dev/shm/ directory?
Thank you.
The text was updated successfully, but these errors were encountered:
carlosrodfern
changed the title
Reasoning about the preventing of writes to /dev/shm/ and possible bug
The reasoning behind preventing writes to /dev/shm/ and a possible bug
Aug 14, 2024
I'm having a hard time seeing the reasoning for the policy recommendation to prevent writes to
/dev/shm/
.This is the policy: https://github.com/kubearmor/policy-templates/blob/release/generic/system/ksp-deny-write-in-shm-folder.yaml
I can't find any reference to preventing writes to
/dev/shm/
in MITRE either. The/dev/shm/
is a common IPC mechanism in Linux for shared memory between processes. Preventing writes to it would interfere with some applications.The only thing I can find about
/dev/shm/
in MITRE execution is about preventingexecve(2)
from unusual places like/dev/shm/
. If that is what the original intent of this policy was, then perhaps a better rule is to prevent execution of files located in the/dev/shm/
directory?Thank you.
The text was updated successfully, but these errors were encountered: