The operating system kernel of the nodes MUST have isolation mechanisms to limit the visibility and resource usage of the pods among themselves (see Linux namespaces and cgroups). The separation MUST include at least process IDs, inter-process communication, user IDs, file system and network including host name.
OpenShift uses Red Hat Enterprise Linux CoreOS, which is aimed at container operations, for the nodes. Optionally, Red Hat Enterprise Linux (RHEL) can also be used for worker nodes. In both configurations, CRI-O is the container runtime. At the system level in particular,
cgroups
Seccomp
SELinux in 'enforcing' mode
enforce the separation of the pods. OpenShift already operates according to the principle of least privilege and the need-to-know principle and uses these together with predefined security profiles (Security Context Constraints / [SCC]) as part of security-by-design and security-by-default in the standard automatically. The separation has already been implemented in OpenShift; no further measures are usually required.
NODE BASED CONTROLS!!
this rules seem to have no automatic check: