Back to controls

AI Kubernetes workloads should not run privileged

Self-hosted AI workloads often run model servers, agents, MCP servers, notebook servers, and GPU runtimes. Privileged containers, privilege escalation, writable root filesystems, or powerful Linux capabilities can turn prompt injection or dependency compromise into node-level impact.

Category

Controls

High

Applies to

Kubernetes

Coverage

1 queries

Asset types

7 covered

Overview

Self-hosted AI workloads often run model servers, agents, MCP servers, notebook servers, and GPU runtimes. Privileged containers, privilege escalation, writable root filesystems, or powerful Linux capabilities can turn prompt injection or dependency compromise into node-level impact.

Remediation guidance

Remediation

Run AI workloads with restricted pod security settings. Disable privileged mode and privilege escalation, drop unnecessary capabilities, and use read-only root filesystems where supported.

  1. Identify AI workloads using privileged runtime settings.
  2. Remove unnecessary host and kernel-level access.
  3. Apply namespace policy, workload admission controls, and runtime monitoring for exceptions.

Query logic

These are the stored checks tied to this control.

AI Kubernetes workloads should not run with privileged runtime settings

Connectors

Kubernetes

Covered asset types

AI ServicesCronJobDaemonSetDeploymentJobPodStatefulSet

Expected check: eq []

{
  pods(where: { assetCategory: { eq: "AI Services" }, containers_SOME: { securityContext: { OR: [ { allowPrivilegeEscalation: { eq: true } } { readOnlyRootFilesystem: { eq: false } } { capabilitiesAdd_INCLUDES: "SYS_ADMIN" } { privileged: { eq: true } } ] } } }) { ...AssetFragment }
  deployments(where: { assetCategory: { eq: "AI Services" }, podTemplate: { containersTemplates_SOME: { securityContext: { OR: [ { allowPrivilegeEscalation: { eq: true } } { readOnlyRootFilesystem: { eq: false } } { capabilitiesAdd_INCLUDES: "SYS_ADMIN" } { privileged: { eq: true } } ] } } } }) { ...AssetFragment }
  statefulSets(where: { assetCategory: { eq: "AI Services" }, podTemplate: { containersTemplates_SOME: { securityContext: { OR: [ { allowPrivilegeEscalation: { eq: true } } { readOnlyRootFilesystem: { eq: false } } { capabilitiesAdd_INCLUDES: "SYS_ADMIN" } { privileged: { eq: true } } ] } } } }) { ...AssetFragment }
  daemonSets(where: { assetCategory: { eq: "AI Services" }, podTemplate: { containersTemplates_SOME: { securityContext: { OR: [ { allowPrivilegeEscalation: { eq: true } } { readOnlyRootFilesystem: { eq: false } } { capabilitiesAdd_INCLUDES: "SYS_ADMIN" } { privileged: { eq: true } } ] } } } }) { ...AssetFragment }
  jobs(where: { assetCategory: { eq: "AI Services" }, cronJobName: { eq: "" }, podTemplate: { containersTemplates_SOME: { securityContext: { OR: [ { allowPrivilegeEscalation: { eq: true } } { readOnlyRootFilesystem: { eq: false } } { capabilitiesAdd_INCLUDES: "SYS_ADMIN" } { privileged: { eq: true } } ] } } } }) { ...AssetFragment }
  cronJobs(where: { assetCategory: { eq: "AI Services" }, podTemplate: { containersTemplates_SOME: { securityContext: { OR: [ { allowPrivilegeEscalation: { eq: true } } { readOnlyRootFilesystem: { eq: false } } { capabilitiesAdd_INCLUDES: "SYS_ADMIN" } { privileged: { eq: true } } ] } } } }) { ...AssetFragment }
}
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon