Profile applicability: Level 1
Use allowedHostPath to deny a container feature frequently exploited to breakout.
Audit
Run the following command and review the namespace metadata annotations:
kubectl get namespaces
Verify that the annotations 
pod-security.kubernetes.io/enforce equal restricted and pod-security.kubernetes.io/allowedHostPath equal false.Remediation
Add relevant annotations in namespaces to enforce restricted policies and configure
                  allowedHostPath. Using Pod Security Admission (PSA), apply "restricted" security mode
                  at the namespace level.
Alternatively, create and apply a Kyverno policy to restrict hostPath usage, or use
                  Open Policy Agent (OPA) Gatekeeper to create a constraint template for an allowed
                  hostPath to enforce and apply the policy.
For AWS EKS clusters, Kyverno or OPA Gatekeeper is recommended. For OpenShift, ensure
                  that the Security Context Constraint (SCC) assigned to a user/group does not allow
                  hostPath.
 
		