To add a container runtime profile:
The profile settings input window opens.
Scopes in runtime profiles allow profiles to be used correctly in runtime policies.
When a runtime profile is applied with the File Threat Protection component enabled, Kaspersky Container Security activates real-time file threat protection on all nodes within the scopes defined for that policy. The configuration of the deployed agents depends on the settings that you specify for File Threat Protection. You can configure the File Threat Protection settings by clicking the File Threat Protection settings button on the Container runtime profiles tab in the Policies → Runtime section.
/bin/php
). You can also use an *
mask (for example, /bin/*
) to apply a rule to an entire directory and its subdirectories.You can fine-tune the list of allowed and blocked executable files by specifying exclusions for blocking rules. For example, you can specifically exclude the path /bin/cat
for a rule applied to /bin/*
. In this case, all executable files from the directory /bin/
will be blocked from running except the /bin/cat
application.
Example path to executable files
When working with the busybox
binary that is delivered with many basic container images (such as alpine
), you must take into account that busybox
contains a set of commands to fetch applications without an explicit specification of such applications. For example, the ls
command is used to fetch the /bin/ls
executable file, which in turn is a symbolic link to /bin/busybox
. In this case, you must specify the path to the executable file as follows: /bin/busybox/ls
(that is, you must concatenate the original path of the /bin/busybox
executable file and its ls
command with the /
symbol).
If you select the Allow exclusions check box, the application will block all executable files except those specified in the Allow exclusions field when a container is started and running.
All rules and exceptions specified for this group of parameters are regular expressions (regexp). The solution uses the specified patterns and indicators to find all files that match a specific regular expression.
If you select the Allow exclusions check box, you can specify the parameters of one or more allowed sources of inbound network connections. To define exclusions, you must specify at least one of the following parameters:
If you need to specify multiple ports, use a comma, e.g. 8080, 8082.
If you do not specify a value for the ports, the application will allow a connection over all ports.
If you select the Allow exclusions check box, you can specify the parameters of one or more allowed destinations for outbound network connections. To define exclusions, you must specify at least one of the following parameters:
If you need to specify multiple ports, use a comma, e.g. 8080, 8082.
If you do not specify a value for the ports, the application will allow a connection over all ports.
When specifying paths to files, only enter full paths that begin with a forward slash.
If necessary, add rules for monitoring file operations using the Add rule button. The solution will apply multiple file operation monitoring rules within a single runtime policy.
For file operations, only Audit mode is supported. If the Enforce mode is specified in the applicable runtime policy, file operations are performed in Audit mode.
The added runtime profile is displayed in the Policies → Runtime policies → Container runtime profiles section.
Page top