To add a container runtime profile:
The profile settings input window opens.
Scopes in runtime profiles allow profiles to be used correctly in runtime policies.
/bin/php
). However, you can specify a directory using a *
mask, for example, /bin/*
, which lets you apply the rule to the entire directory and its subdirectories and allow all executable files in subdirectories of the /bin
directory.
You can fine-tune the list of allowed and blocked executable files by specifying exclusions for blocking rules. For example, you can specifically exclude the path /bin/cat
for a rule applied to /bin/*
. In this case, all executable files from the directory /bin/
will be blocked from running except the /bin/cat
application.
You can specify executable files so that fast processes are synchronously blocked in containers.
When working with the busybox
binary that is delivered with many basic container images (such as alpine
), you must take into account that busybox
contains a set of commands to fetch applications without an explicit specification of such applications. For example, the ls
command is used to fetch the /bin/ls
executable file, which in turn is a symbolic link to /bin/busybox
. In this case, you must specify the path to the executable file as follows: /bin/busybox/ls
(that is, you must concatenate the original path of the /bin/busybox
executable file and its ls
command with the /
symbol).
If you select the Allow exclusions check box, the application will block all executable files except those specified in the Allow exclusions field when a container is started and running.
All rules and exceptions specified for this group of parameters are regular expressions (regexp). The solution uses the specified patterns and indicators to find all files that match a specific regular expression.
If Cilium CNI is used, you must specify the Cilium CNI rules in rules and exceptions, in addition to the CIDR and FQDN. This allows the solution to process Cilium service information and distinguish it from CIDRs, FQDNs, and other labels in the single input field.
Enabled ingress network connection settings are not applied if the profile is specified in an Audit runtime policy that has been started for a Cilium CNI cluster.
If you select the Allow exclusions check box, you can specify the parameters of one or more allowed sources of inbound network connections. To define exclusions, you must specify at least one of the following parameters:
If you do not specify a value for the ports, the application will allow a connection over all ports.
Enabled egress network connection settings are not applied if the profile is specified in an Audit runtime policy that has been started for a Cilium CNI cluster.
If you select the Allow exclusions check box, you can specify the parameters of one or more allowed destinations for outbound network connections. To define exclusions, you must specify at least one of the following parameters:
If you do not specify a value for the ports, the application will allow a connection over all ports.
When a runtime profile is applied with the File Threat Protection component enabled, Kaspersky Container Security activates real-time file threat protection on all nodes within the scopes defined for that policy. The configuration of the deployed agents depends on the settings that you specify for File Threat Protection. You can configure the File Threat Protection settings by clicking the File Threat Protection settings button on the Container runtime profiles tab in the Policies → Runtime section.
When specifying paths to files, only enter full paths that begin with a forward slash.
If necessary, add rules for monitoring file operations using the Add rule button. The solution will apply multiple file operation monitoring rules within a single runtime policy.
For file operations, only Audit mode is supported. If the Enforce mode is specified in the applicable runtime policy, file operations are performed in Audit mode.
This option is selected by default.
Only the Audit mode is supported for port monitoring. If the Enforce mode is specified in the applicable runtime policy, file operations are performed in Audit mode.
By default, the Disabled / Enabled toggle switches for all options are disabled.
The added runtime profile is displayed in the Policies → Runtime policies → Container runtime profiles section.
Page top