Strict confinement is a snap confinement level that provides complete isolation, up to a minimal access level to the host resources. Strictly confined snaps can not access files, networks, processes, or any other system resource without requesting specific permission. It is therefore deemed safe. Strict confinement uses security features of the Linux kernel, including AppArmor, seccomp, and namespaces to prevent applications and services from accessing the wider system.
Interfaces are the key. Interfaces have two sides a plug ans a slot. Slots can be thought of as a resource access request while slots are the resource access options available on a host. Each snap’s slot is carefully selected by the creator to map resource requirements while plugs are predefined system wide. An interface needs to be connected to be active so connections are made (either automatically at install time or manually) depending on their function. See the full list of interfaces interfaces here.
Strict confinement proves to be a great match for the Kubernetes runtime and hosted workloads. Often times these application workloads interact with the host machines in ways that can be unpredictable and might even be insecure. Strict confinement makes sure that this dynamic environment is isolated and that application workloads are doing what they are expected to be doing. Any CVEs, malicious actors, bugs, etc. will be limited to the sandbox setup by strict confinement.
Note that there are caveats to this level of isolation. Some applications that require elevated permissions to critical system resources which might not be allowed to run.
Workloads requiring “shared mount” point with the host are blocked because they break the expected isolation. For these workloads the classic snap should be used instead (
snap install microk8s --classic). Addons affected by this include,
The MicroK8s team tests the strictly confined snap extensively against a large set of workloads. However this does not guaranty that every possible workload will run unaffected in a strictly confined setup. Should you find one such workload we would appreciate if you opened a github issue so we can review the case and include proper mitigation in future releases. To handle such cases users can use the
--devmodeflag when installing the strict snap.
Due to limitations in how strictly confined services are handled certain
microk8scommands that anyone from the
microk8suser groups could execute now require elevated permissions.