Infrastructure Security |
json |
MEDIUM |
Containers Should Not Share the Host Network Namespace |
AC-K8-NS-PO-M-0164 |
Infrastructure Security |
json |
MEDIUM |
Image without digest affects the integrity principle of image security |
AC-K8-NS-PO-M-0133 |
Identity and Access Management |
json |
HIGH |
Minimize Admission of Root Containers |
AC-K8-IA-PO-H-0168 |
Security Best Practices |
json |
Medium |
CPU Request Not Set in config file. |
AC-K8-OE-PK-M-0155 |
Security Best Practices |
json |
HIGH |
Default Namespace Should Not be Used |
AC-K8-OE-PO-M-0166 |
Infrastructure Security |
json |
MEDIUM |
Do Not Use CAP_SYS_ADMIN Linux Capability |
AC-K8-NS-PO-H-0170 |
Security Best Practices |
json |
Medium |
Memory Limits Not Set in config file. |
AC-K8-OE-PK-M-0158 |
Data Protection |
json |
MEDIUM |
Ensure That Tiller (Helm V2) Is Not Deployed |
AC-K8-DS-PO-M-0177 |
Security Best Practices |
json |
LOW |
No readiness probe will affect automatic recovery in case of unexpected errors |
AC-K8-OE-PO-L-0130 |
Identity and Access Management |
json |
MEDIUM |
Default seccomp profile not enabled will make the container to make non-essential system calls |
AC-K8-IA-PO-M-0141 |
Identity and Access Management |
json |
MEDIUM |
Container images with readOnlyRootFileSystem set as false mounts the container root file system with write permissions |
AC-K8-IA-PO-M-0140 |
Infrastructure Security |
json |
HIGH |
Prefer using secrets as files over secrets as environment variables |
AC-K8-NS-PO-H-0117 |
Infrastructure Security |
json |
MEDIUM |
Containers Should Not Share Host IPC Namespace |
AC-K8-NS-PO-M-0163 |
Infrastructure Security |
json |
MEDIUM |
Apply Security Context to Your Pods and Containers |
AC-K8-NS-PO-M-0122 |
Data Protection |
json |
MEDIUM |
Ensure Kubernetes Dashboard Is Not Deployed |
AC-K8-DS-PO-M-0176 |
Identity and Access Management |
json |
HIGH |
Allowing hostPaths to mount to Pod arise the probability of getting access to the node’s filesystem |
AC-K8-IA-PO-H-0138 |
Identity and Access Management |
json |
MEDIUM |
Some volume types mount the host file system paths to the pod or container, thus increasing the chance of escaping the container to access the host |
AC-K8-IA-PO-M-0143 |
Identity and Access Management |
json |
MEDIUM |
Allowing the pod to make system level calls provide access to host/node sensitive information |
AC-K8-IA-PO-H-0137 |
Data Protection |
json |
MEDIUM |
Vulnerable to CVE-2020-8555 (affected version of kube-controller-manager: v1.18.0, v1.17.0 - v1.17.4, v1.16.0 - v1.16.8, and v1.15.11 |
AC-K8-DS-PO-M-0143 |
Compliance Validation |
json |
MEDIUM |
AlwaysPullImages plugin is not set |
AC-K8-OE-PK-M-0034 |
Identity and Access Management |
json |
MEDIUM |
Unmasking the procMount will allow more information than is necessary to the program running in the containers spawned by k8s |
AC-K8-IA-PO-M-0139 |
Identity and Access Management |
json |
MEDIUM |
AppArmor profile not set to default or custom profile will make the container vulnerable to kernel level threats |
AC-K8-IA-PO-M-0135 |
Identity and Access Management |
json |
MEDIUM |
Containers Should Not Share Host Process ID Namespace |
AC-K8-IA-PO-M-0162 |
Infrastructure Security |
json |
MEDIUM |
Containers Should Run as a High UID to Avoid Host Conflict |
AC-K8-NS-PO-M-0182 |
Identity and Access Management |
json |
MEDIUM |
Minimize the admission of containers with the NET_RAW capability |
AC-K8-IA-PS-M-0112 |
Security Best Practices |
json |
LOW |
No liveness probe will ensure there is no recovery in case of unexpected errors |
AC-K8-OE-PO-L-0129 |
Security Best Practices |
json |
LOW |
No tag or container image with :Latest tag makes difficult to rollback and track |
AC-K8-OE-PO-L-0134 |
Security Best Practices |
json |
Medium |
Memory Request Not Set in config file. |
AC-K8-OE-PK-M-0157 |
Compliance Validation |
json |
HIGH |
Containers Should Not Run with AllowPrivilegeEscalation |
AC-K8-CA-PO-H-0165 |
Identity and Access Management |
json |
HIGH |
Minimize the admission of privileged containers |
AC-K8-IA-PO-H-0106 |
Security Best Practices |
json |
Medium |
CPU Limits Not Set in config file. |
AC-K8-OE-PK-M-0156 |
Infrastructure Security |
json |
MEDIUM |
Restrict Mounting Docker Socket in a Container |
AC-K8-NS-PO-M-0171 |
Identity and Access Management |
json |
MEDIUM |
Ensure that Service Account Tokens are only mounted where necessary |
AC-K8-IA-PO-M-0105 |