Seccomp Profiles
You can define Kubernetes seccomp profiles that can be included in a Pod Security Standards Profile. Seccomp profiles list the system calls that the pod is able to execute. Deployment rules that use the Pod security profile (with the seccomp profile) will check whether the pod complies with the profile. They can also enforce the profile by modifying the pod to conform to the profile.
Create Seccomp profile
Create seccomp profiles in the POD STANDARDS tab.
- Click Seccomps (on the right).

- Click New Seccomp profile.

- Enter a name for the profile.
- Enter details for the seccomp policy as a JSON block, and then click FINISH.
For example:
{
"defaultAction": "SCMP_ACT_LOG", <--- Default action is to log/detect the system call
"architectures": [
"SCMP_ARCH_X86_64",
"SCMP_ARCH_X86",
"SCMP_ARCH_X32"
],
"syscalls": [
{
"names": [
"arch_prctl",
"sched_yield",
"futex",
"write",
"mmap",
"exit_group",
"madvise",
"rt_sigprocmask",
"getpid",
"gettid",
"tgkill",
"rt_sigaction",
"read",
"getpgrp"
],
"action": "SCMP_ACT_ALLOW" <------------- Allowed system calls
},
{
"names": [
"add_key",
"keyctl",
"ptrace"
],
"action": "SCMP_ACT_ERRNO" <------------- Blocked system calls
}
]
}
Use Seccomp policies in an Pod Profile
- Select the POD Security Standards Profile (or create a new one) in the POD STANDARDS tab of the POLICIES page.
- In STEP 2 (Properties), expand Show advance options.
- Scroll to the Seccomp Profile section (near the bottom), and select a Seccomp profile from the list (or, optionally, click Create new, to create a new Seccomp profile, using the procedure described above).

- Click FINISH.
Updated about 1 month ago