--- allowHostDirVolumePlugin: false allowHostIPC: false allowHostNetwork: false allowHostPID: false allowHostPorts: false allowPrivilegeEscalation: false allowPrivilegedContainer: false allowedCapabilities: - NET_BIND_SERVICE apiVersion: security.openshift.io/v1 defaultAddCapabilities: null fsGroup: type: MustRunAs groups: [] kind: SecurityContextConstraints metadata: annotations: include.release.openshift.io/ibm-cloud-managed: "true" include.release.openshift.io/self-managed-high-availability: "true" include.release.openshift.io/single-node-developer: "true" kubernetes.io/description: restricted-v2 denies access to all host features and requires pods to be run with a UID, and SELinux context that are allocated to the namespace. This is the most restrictive SCC and it is used by default for authenticated users. On top of the legacy 'restricted' SCC, it also requires to drop ALL capabilities and does not allow privilege escalation binaries. It will also default the seccomp profile to runtime/default if unset, otherwise this seccomp profile is required. creationTimestamp: "2025-10-11T10:24:21Z" generation: 1 managedFields: - apiVersion: security.openshift.io/v1 fieldsType: FieldsV1 fieldsV1: f:allowHostDirVolumePlugin: {} f:allowHostIPC: {} f:allowHostNetwork: {} f:allowHostPID: {} f:allowHostPorts: {} f:allowPrivilegeEscalation: {} f:allowPrivilegedContainer: {} f:allowedCapabilities: {} f:defaultAddCapabilities: {} f:fsGroup: .: {} f:type: {} f:groups: {} f:metadata: f:annotations: .: {} f:include.release.openshift.io/ibm-cloud-managed: {} f:include.release.openshift.io/self-managed-high-availability: {} f:include.release.openshift.io/single-node-developer: {} f:kubernetes.io/description: {} f:priority: {} f:readOnlyRootFilesystem: {} f:requiredDropCapabilities: {} f:runAsUser: .: {} f:type: {} f:seLinuxContext: .: {} f:type: {} f:seccompProfiles: {} f:supplementalGroups: .: {} f:type: {} f:users: {} f:volumes: {} manager: cluster-bootstrap operation: Update time: "2025-10-11T10:24:21Z" - apiVersion: security.openshift.io/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:ownerReferences: .: {} k:{"uid":"d5f199fe-acec-4610-b505-6d5fa3929e77"}: {} manager: cluster-version-operator operation: Update time: "2025-10-11T10:25:43Z" name: restricted-v2 ownerReferences: - apiVersion: config.openshift.io/v1 controller: true kind: ClusterVersion name: version uid: d5f199fe-acec-4610-b505-6d5fa3929e77 resourceVersion: "1860" uid: 653b964d-3c9c-41ed-98b8-c499877e5bd3 priority: null readOnlyRootFilesystem: false requiredDropCapabilities: - ALL runAsUser: type: MustRunAsRange seLinuxContext: type: MustRunAs seccompProfiles: - runtime/default supplementalGroups: type: RunAsAny users: [] volumes: - configMap - csi - downwardAPI - emptyDir - ephemeral - persistentVolumeClaim - projected - secret