diff --git a/policy/modules/services/container.te b/policy/modules/services/container.te
index 0e29369e8..0b798993c 100644
--- a/policy/modules/services/container.te
+++ b/policy/modules/services/container.te
@@ -1145,6 +1145,7 @@ optional_policy(`
kubernetes_manage_runtime_dirs(spc_t)
kubernetes_mounton_runtime_dirs(spc_t)
kubernetes_manage_runtime_files(spc_t)
+ kubernetes_map_runtime_files(spc_t)
kubernetes_watch_runtime_files(spc_t)
kubernetes_manage_runtime_symlinks(spc_t)
kubernetes_manage_runtime_sock_files(spc_t)
diff --git a/policy/modules/services/kubernetes.if b/policy/modules/services/kubernetes.if
index ea6ecd1d5..de14a7b61 100644
--- a/policy/modules/services/kubernetes.if
+++ b/policy/modules/services/kubernetes.if
@@ -641,6 +641,24 @@ interface(`kubernetes_manage_runtime_files',`
allow $1 kubernetes_runtime_t:file manage_file_perms;
')
+########################################
+##
+## Memory map kubernetes runtime files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+interface(`kubernetes_map_runtime_files',`
+ gen_require(`
+ type kubernetes_runtime_t;
+ ')
+
+ allow $1 kubernetes_runtime_t:file map;
+')
+
########################################
##
## Watch kubernetes runtime files.