-
Notifications
You must be signed in to change notification settings - Fork 551
Closed
Milestone
Description
Description
Mirror of TOB-JKUBE-1
.
JKube can generate Kubernetes deployment artifacts and deploy applications using those
artifacts. By default, many of the security features offered by Kubernetes are not enabled
in these artifacts. This can lead to the deployed applications having more permissions than
their workload requires. If such an application was compromised, the permissions would
enable the attacker to perform further attacks against the container or host.
Subtasks (To be evaluated one by one)
- Pods have no associated network policies.
- Dockerfiles have base image references that use the latest tag.
- Container image references use the latest tag, or no tag, instead of a named tag
or a digest. - Resource (CPU, memory) limits are not set.
- Containers have allowPrivilegeEscalation unset.
- Containers are not configured to use a read-only filesystem.
- Containers run as the root user, and have privileged capabilities.
- Seccomp profiles are not enabled on containers.
- Service account tokens are mounted on pods where they may not be needed.