# Disallow `hostPID` and `hostIPC` Sharing the host's PID namespace allows an application pod to gain visibility of processes on the host, potentially exposing sensitive information. Sharing the host's IPC namespace also allows the container process to communicate with processes on the host. To avoid pod container from having visibility to host process space, validate that `hostPID` and `hostIPC` are set to `false`. ## Policy YAML [disallow_host_pid_ipc.yaml](best_practices/disallow_host_pid_ipc.yaml) ````yaml apiVersion: kyverno.io/v1 kind: ClusterPolicy metadata: name: disallow-host-pid-ipc spec: validationFailureAction: audit rules: - name: validate-hostPID-hostIPC match: resources: kinds: - Pod validate: message: "Use of host PID and IPC namespaces is not allowed" pattern: spec: =(hostPID): "false" =(hostIPC): "false" ````