Containers sharing sensitive host namespaces should be avoided

HIGH

Prevents containers from sharing host PID, IPC, or network namespaces, which could expose sensitive host-level data.

What does this mean?

Sharing host namespaces (PID, IPC, network) with containers breaks the isolation boundary between the container and the host. This can expose host processes, allow inter-process communication attacks, or enable network-level access to host services.

Benefits of implementation

  • Maintains strong isolation between containers and the host
  • Prevents visibility into host processes from within a container
  • Required by CIS Kubernetes Benchmark

Drawbacks and considerations

  • Some system-level tools or debugging containers need host namespace access
  • Network monitoring tools may require host network namespace
  • Exceptions must be carefully evaluated and documented

Implementation

Implementation guidance coming soon.

Related recommendations will be linked here.

Frameworks

Details
Risk Level
HIGH
Category
Container Security
Azure Resource

Frameworks
3 frameworks
Last updated
2026-02-12