It is recommended to disallow Docker socket access to all pods running on a cluster. When a container has access to the Docker socket, it can effectively manage other containers on the host.
Targeted resources by this rule (types of kind): Deployment / Pod / DaemonSet / StatefulSet / ReplicaSet / CronJob / Job
Enabled by default? False
Policy as code identifier: CONTAINERS_INCORRECT_PATH_VALUE_DOCKERSOCKET
If one of the volumes is targeting the /var/run/docker.sock path
Avoid mounting the Docker socket