Cluster Overview: https://10.43.0.1:443
Score is the percentage of passing checks. Warnings get half the weight of dangerous checks.
-
1227 passing checks
-
551 warning checks
-
66 dangerous checks
Results by Category
Configuring resource requests and limits for workloads running in Kubernetes helps ensure that every container will have access to all the resources it needs. These are also a crucial part of cluster autoscaling logic, as new nodes are only spun up when there is insufficient capacity on existing infrastructure for new pod(s). By default, Polaris validates that resource requests and limits are set, it also includes optional functionality to ensure these requests and limits fall within specified ranges. Refer to the Polaris documentation about Efficiency for more information.
Kubernetes is built to reliabily run highly available applications. Polaris includes a number of checks to ensure that you are maximizing the reliability potential of Kubernetes. Refer to the Polaris documentation about Reliability for more information.
Kubernetes provides a great deal of configurability when it comes to the security of your workloads. A key principle here involves limiting the level of access any individual workload has. Polaris has validations for a number of best practices, mostly focused on ensuring that unnecessary access has not been granted to an application workload. Refer to the Polaris documentation about Security for more information.
Cluster Resources
Namespace: argocd
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
- HostPath volumes are not configured
Container argocd-applicationset-controller:
- CPU limits should be set
- CPU requests should be set
- Readiness probe should be configured
- Liveness probe should be configured
- Memory limits should be set
- Memory requests should be set
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Privilege escalation not allowed
- The container does not set potentially sensitive environment variables
- Container does not have any insecure capabilities
- Filesystem is read only
- Is not allowed to run as root
- Image tag is specified
- Container does not have any dangerous capabilities
- Image pull policy is "Always"
- Not running as privileged
- Host port is not configured
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- Privileged access to the host check is valid
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
Container copyutil:
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Image tag is specified
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Privilege escalation not allowed
- Not running as privileged
- Container does not have any dangerous capabilities
- Host port is not configured
- Container does not have any insecure capabilities
- Filesystem is read only
- Image pull policy is "Always"
Container dex:
- CPU limits should be set
- Liveness probe should be configured
- Memory limits should be set
- Readiness probe should be configured
- CPU requests should be set
- Memory requests should be set
- Privilege escalation not allowed
- Container does not have any dangerous capabilities
- Host port is not configured
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Image pull policy is "Always"
- Not running as privileged
- Is not allowed to run as root
- Image tag is specified
- Filesystem is read only
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host network is not configured
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host PID is not configured
- HostPath volumes are not configured
Container argocd-notifications-controller:
- Memory requests should be set
- CPU limits should be set
- Memory limits should be set
- Readiness probe should be configured
- CPU requests should be set
- Not running as privileged
- Image pull policy is "Always"
- Container does not have any dangerous capabilities
- Host port is not configured
- Privilege escalation not allowed
- Image tag is specified
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Liveness probe is configured
- Filesystem is read only
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
Container secret-init:
- Image pull policy should be "Always"
- Is not allowed to run as root
- Container does not have any dangerous capabilities
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Container does not have any insecure capabilities
- Filesystem is read only
- Privilege escalation not allowed
Container redis:
- CPU requests should be set
- Memory limits should be set
- Liveness probe should be configured
- CPU limits should be set
- Memory requests should be set
- Readiness probe should be configured
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Image pull policy is "Always"
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Filesystem is read only
- Privilege escalation not allowed
- Not running as privileged
- Is not allowed to run as root
- Container does not have any dangerous capabilities
- Host port is not configured
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host PID is not configured
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Privileged access to the host check is valid
- The ServiceAccount will not be automounted
- Host network is not configured
Container copyutil:
- Image pull policy should be "Always"
- Container does not have any dangerous capabilities
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Not running as privileged
- Is not allowed to run as root
- Image tag is specified
- Container does not have any insecure capabilities
- Filesystem is read only
- Privilege escalation not allowed
- The container does not set potentially sensitive environment variables
Container argocd-repo-server:
- Memory requests should be set
- CPU limits should be set
- CPU requests should be set
- Memory limits should be set
- Host port is not configured
- Container does not have any insecure capabilities
- Privilege escalation not allowed
- Is not allowed to run as root
- Image tag is specified
- Container does not have any dangerous capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Filesystem is read only
- Image pull policy is "Always"
- Readiness probe is configured
- Not running as privileged
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- The ServiceAccount will be automounted
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Privileged access to the host check is valid
Container argocd-server:
- Memory limits should be set
- Memory requests should be set
- CPU limits should be set
- CPU requests should be set
- Container does not have any insecure capabilities
- Is not allowed to run as root
- Image pull policy is "Always"
- Not running as privileged
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Filesystem is read only
- Privilege escalation not allowed
- Readiness probe is configured
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
Spec:
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference a Role allowing Pod exec or attach
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- HostPath volumes are not configured
- Privileged access to the host check is valid
Container argocd-application-controller:
- CPU requests should be set
- Liveness probe should be configured
- Memory limits should be set
- CPU limits should be set
- Memory requests should be set
- Is not allowed to run as root
- Image tag is specified
- Privilege escalation not allowed
- Container does not have any dangerous capabilities
- Filesystem is read only
- Image pull policy is "Always"
- Container does not have any insecure capabilities
- The container does not set potentially sensitive environment variables
- Not running as privileged
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Readiness probe is configured
Namespace: bitwarden
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- Host network is not configured
- The default /proc masks are set up to reduce attack surface, and should be required
Container manager:
- Filesystem should be read only
- Image pull policy should be "Always"
- Is not allowed to run as root
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Memory limits are set
- Image tag is specified
- Liveness probe is configured
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- Privilege escalation not allowed
- CPU requests are set
- Container does not have any dangerous capabilities
- Host port is not configured
- Container does not have any insecure capabilities
- Memory requests are set
- CPU limits are set
- Not running as privileged
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Namespace: cert-manager
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- Priority class should be set
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
Container cert-manager-controller:
- Image pull policy should be "Always"
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- Container does not have any insecure capabilities
- Privilege escalation not allowed
- Not running as privileged
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
Container cert-manager-cainjector:
- Image pull policy should be "Always"
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- Container does not have any insecure capabilities
- Privilege escalation not allowed
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
Container cert-manager-webhook:
- Image pull policy should be "Always"
- Host port is not configured
- Container does not have any insecure capabilities
- Privilege escalation not allowed
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Container does not have any dangerous capabilities
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: database
Spec: no checks applied
Pod Spec:
- Host network should not be configured
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- The default /proc masks are set up to reduce attack surface, and should be required
- Privileged access to the host check is valid
- Host IPC is not configured
- Host PID is not configured
- HostPath volumes are not configured
Container mysql:
- Should not be allowed to run as root
- Privilege escalation should not be allowed
- Filesystem should be read only
- Readiness probe should be configured
- CPU requests should be set
- Liveness probe should be configured
- CPU limits should be set
- Image pull policy should be "Always"
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory limits should be set
- Container should not have insecure capabilities
- Memory requests should be set
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Not running as privileged
- Image tag is specified
- Host port is not configured
Namespace: default
Namespace: development
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- The ServiceAccount will be automounted
- Host PID is not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
Container api-gateway:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- CPU limits should be set
- Container should not have insecure capabilities
- Filesystem should be read only
- Image pull policy should be "Always"
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Liveness probe should be configured
- Memory requests should be set
- CPU requests should be set
- Memory limits should be set
- Readiness probe should be configured
- Host port is not configured
- Not running as privileged
- Image tag is specified
- Container does not have any dangerous capabilities
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- HostPath volumes are not configured
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container auth-service:
- Should not be allowed to run as root
- Privilege escalation should not be allowed
- CPU limits should be set
- CPU requests should be set
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Image pull policy should be "Always"
- Filesystem should be read only
- Container should not have insecure capabilities
- Memory requests should be set
- Readiness probe should be configured
- Liveness probe should be configured
- Memory limits should be set
- Not running as privileged
- Host port is not configured
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Container does not have any dangerous capabilities
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host PID is not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- Host network is not configured
Container frontend-service:
- Should not be allowed to run as root
- Privilege escalation should not be allowed
- CPU limits should be set
- Filesystem should be read only
- Readiness probe should be configured
- Memory requests should be set
- Container should not have insecure capabilities
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Liveness probe should be configured
- CPU requests should be set
- Memory limits should be set
- Image pull policy should be "Always"
- Not running as privileged
- Image tag is specified
- Host port is not configured
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host IPC is not configured
- Host network is not configured
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host PID is not configured
- Privileged access to the host check is valid
Container hello-service:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Readiness probe should be configured
- Liveness probe should be configured
- Filesystem should be read only
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Image pull policy should be "Always"
- CPU limits are set
- CPU requests are set
- Image tag is specified
- Container does not have any dangerous capabilities
- Not running as privileged
- Memory limits are set
- The container does not set potentially sensitive environment variables
- Host port is not configured
- Memory requests are set
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
- Privileged access to the host check is valid
- Host PID is not configured
Container myapp:
- Should not be allowed to run as root
- Privilege escalation should not be allowed
- Memory limits should be set
- Memory requests should be set
- Filesystem should be read only
- CPU requests should be set
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- CPU limits should be set
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Host port is not configured
- Liveness probe is configured
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Container does not have any dangerous capabilities
- Readiness probe is configured
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- HostPath volumes are not configured
- Host network is not configured
- Host PID is not configured
- Privileged access to the host check is valid
Container todo-service:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Memory limits should be set
- Memory requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- Readiness probe should be configured
- Container should not have insecure capabilities
- CPU limits should be set
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- CPU requests should be set
- Liveness probe should be configured
- Image tag is specified
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Not running as privileged
- Host port is not configured
Spec: no checks applied
Namespace: elastic
Pod Spec:
- The ServiceAccount will be automounted
- HostPath volumes must be forbidden
- Pod should be configured with a valid topology spread constraint
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host PID is not configured
- Privileged access to the host check is valid
Container fluent-bit:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Image pull policy should be "Always"
- CPU limits should be set
- Liveness probe should be configured
- Memory requests should be set
- Readiness probe should be configured
- Filesystem should be read only
- Container should not have insecure capabilities
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- CPU requests should be set
- Memory limits should be set
- Container does not have any dangerous capabilities
- Image tag is specified
- Host port is not configured
- Not running as privileged
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- Pod should be configured with a valid topology spread constraint
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- The default /proc masks are set up to reduce attack surface, and should be required
- HostPath volumes are not configured
- Privileged access to the host check is valid
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container elasticsearch:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Image pull policy should be "Always"
- Readiness probe should be configured
- CPU limits should be set
- CPU requests should be set
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory limits should be set
- Liveness probe should be configured
- Filesystem should be read only
- Container should not have insecure capabilities
- Memory requests should be set
- Not running as privileged
- Container does not have any dangerous capabilities
- Image tag is specified
- Host port is not configured
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- The ServiceAccount will be automounted
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Privileged access to the host check is valid
Container kibana:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Liveness probe should be configured
- Memory requests should be set
- Readiness probe should be configured
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory limits should be set
- Image pull policy should be "Always"
- CPU limits should be set
- CPU requests should be set
- Filesystem should be read only
- Container does not have any dangerous capabilities
- The container does not set potentially sensitive environment variables
- Not running as privileged
- Image tag is specified
- Host port is not configured
Spec: no checks applied
Spec: no checks applied
Namespace: kube-node-lease
Namespace: kube-public
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Namespace: kube-system
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Pod should be configured with a valid topology spread constraint
- Priority class has been set
- The default /proc masks are set up to reduce attack surface, and should be required
- The ServiceAccount will not be automounted
- Host IPC is not configured
- Host network is not configured
- HostPath volumes are not configured
- Host PID is not configured
- Privileged access to the host check is valid
Container lb-tcp-80:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Container should not have dangerous capabilities
- CPU requests should be set
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Liveness probe should be configured
- Memory requests should be set
- CPU limits should be set
- Host port should not be configured
- Memory limits should be set
- Filesystem should be read only
- Readiness probe should be configured
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Not running as privileged
Container lb-tcp-443:
- Should not be allowed to run as root
- Container should not have dangerous capabilities
- Privilege escalation should not be allowed
- Filesystem should be read only
- Readiness probe should be configured
- Container should not have insecure capabilities
- Memory requests should be set
- CPU limits should be set
- CPU requests should be set
- Liveness probe should be configured
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory limits should be set
- Image pull policy should be "Always"
- Host port should not be configured
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Not running as privileged
Spec:
Pod Spec:
- Priority class has been set
- The default /proc masks are set up to reduce attack surface, and should be required
- Pod has a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
Container coredns:
- Should not be allowed to run as root
- CPU limits should be set
- Image pull policy should be "Always"
- Container does not have any dangerous capabilities
- Liveness probe is configured
- Memory requests are set
- Filesystem is read only
- Host port is not configured
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Privilege escalation not allowed
- Image tag is specified
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- Not running as privileged
- CPU requests are set
- Memory limits are set
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- Privileged access to the host check is valid
- Priority class has been set
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
Container local-path-provisioner:
- Should not be allowed to run as root
- Privilege escalation should not be allowed
- CPU requests should be set
- Memory limits should be set
- Readiness probe should be configured
- CPU limits should be set
- Memory requests should be set
- Filesystem should be read only
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Liveness probe should be configured
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- Not running as privileged
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- Priority class has been set
- The default /proc masks are set up to reduce attack surface, and should be required
Container metrics-server:
- CPU limits should be set
- Memory limits should be set
- Image pull policy should be "Always"
- CPU requests are set
- Container does not have any insecure capabilities
- Readiness probe is configured
- Is not allowed to run as root
- Container does not have any dangerous capabilities
- Host port is not configured
- Memory requests are set
- Filesystem is read only
- Privilege escalation not allowed
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Liveness probe is configured
- Image tag is specified
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- Host network is not configured
- The default /proc masks are set up to reduce attack surface, and should be required
Container traefik:
- Memory limits should be set
- Memory requests should be set
- CPU requests should be set
- Image pull policy should be "Always"
- CPU limits should be set
- Not running as privileged
- Container does not have any dangerous capabilities
- Host port is not configured
- Container does not have any insecure capabilities
- Is not allowed to run as root
- Image tag is specified
- Filesystem is read only
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
- Privilege escalation not allowed
- Readiness probe is configured
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- Host network is not configured
Container helm:
- CPU limits should be set
- CPU requests should be set
- Memory limits should be set
- Memory requests should be set
- Image pull policy should be "Always"
- Container does not have any dangerous capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- The container does not set potentially sensitive environment variables
- Privilege escalation not allowed
- Host port is not configured
- Is not allowed to run as root
- Container does not have any insecure capabilities
- Filesystem is read only
- Not running as privileged
- Image tag is specified
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference a Role allowing Pod exec or attach
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: monitoring
Spec: no checks applied
Pod Spec:
- Host network should not be configured
- Host PID should not be configured
- Pod should be configured with a valid topology spread constraint
- HostPath volumes must be forbidden
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Privileged access to the host check is valid
- The ServiceAccount will not be automounted
Container node-exporter:
- Privilege escalation should not be allowed
- Image pull policy should be "Always"
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory requests should be set
- CPU limits should be set
- Memory limits should be set
- CPU requests should be set
- Container should not have insecure capabilities
- Image tag is specified
- Filesystem is read only
- Readiness probe is configured
- Container does not have any dangerous capabilities
- Not running as privileged
- Host port is not configured
- Liveness probe is configured
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host PID is not configured
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
- Privileged access to the host check is valid
Container goldilocks:
- Liveness probe should be configured
- Memory limits should be set
- CPU limits should be set
- Readiness probe should be configured
- Image pull policy is "Always"
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Not running as privileged
- Is not allowed to run as root
- Image tag is specified
- Privilege escalation not allowed
- The container does not set potentially sensitive environment variables
- CPU requests are set
- Memory requests are set
- Container does not have any dangerous capabilities
- Host port is not configured
- Container does not have any insecure capabilities
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Pod should be configured with a valid topology spread constraint
- Priority class should be set
- Host PID is not configured
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
- HostPath volumes are not configured
Container goldilocks:
- Memory limits should be set
- CPU limits should be set
- Liveness probe is configured
- Image tag is specified
- Is not allowed to run as root
- Host port is not configured
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Privilege escalation not allowed
- The container does not set potentially sensitive environment variables
- CPU requests are set
- Memory requests are set
- Not running as privileged
- Container does not have any dangerous capabilities
- Image pull policy is "Always"
- Readiness probe is configured
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host PID is not configured
- Privileged access to the host check is valid
- Host network is not configured
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
Container vpa:
- CPU limits should be set
- Memory limits should be set
- CPU requests are set
- Container does not have any insecure capabilities
- Readiness probe is configured
- Not running as privileged
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Liveness probe is configured
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Container does not have any dangerous capabilities
- Image pull policy is "Always"
- Host port is not configured
- Memory requests are set
- Privilege escalation not allowed
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host PID is not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
Container vpa:
- CPU limits should be set
- Memory limits should be set
- Readiness probe is configured
- Not running as privileged
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Memory requests are set
- Image tag is specified
- Host port is not configured
- Liveness probe is configured
- Is not allowed to run as root
- Container does not have any insecure capabilities
- Privilege escalation not allowed
- Image pull policy is "Always"
- The container does not set potentially sensitive environment variables
- CPU requests are set
- Container does not have any dangerous capabilities
Spec:
Pod Spec:
- Priority class should be set
- The default /proc masks are set up to reduce attack surface, and should be required
- Pod has a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
Container dashboard:
- CPU limits should be set
- Memory limits should be set
- Container does not have any insecure capabilities
- Memory requests are set
- Image pull policy is "Always"
- Readiness probe is configured
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- CPU requests are set
- Not running as privileged
- Image tag is specified
- Liveness probe is configured
- Privilege escalation not allowed
- Container does not have any dangerous capabilities
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
- Host network is not configured
Container init-chown-data:
- Should not be allowed to run as root
- Privilege escalation should not be allowed
- Filesystem should be read only
- Image pull policy should be "Always"
- Image tag is specified
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Host port is not configured
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
Container grafana-sc-dashboard:
- Image pull policy should be "Always"
- Memory limits should be set
- Readiness probe should be configured
- CPU requests should be set
- Memory requests should be set
- CPU limits should be set
- Liveness probe should be configured
- Filesystem should be read only
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Privilege escalation not allowed
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Container does not have any insecure capabilities
- Host port is not configured
- Not running as privileged
- Is not allowed to run as root
- Container does not have any dangerous capabilities
Container grafana-sc-datasources:
- CPU limits should be set
- Liveness probe should be configured
- Memory limits should be set
- Filesystem should be read only
- CPU requests should be set
- Memory requests should be set
- Readiness probe should be configured
- Image pull policy should be "Always"
- Container does not have any insecure capabilities
- Not running as privileged
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Privilege escalation not allowed
- Container does not have any dangerous capabilities
Container grafana:
- Filesystem should be read only
- CPU limits should be set
- CPU requests should be set
- Memory limits should be set
- Memory requests should be set
- Image pull policy should be "Always"
- Not running as privileged
- Image tag is specified
- Host port is not configured
- Container does not have any insecure capabilities
- The container does not set potentially sensitive environment variables
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Liveness probe is configured
- Readiness probe is configured
- Container does not have any dangerous capabilities
- Privilege escalation not allowed
- Is not allowed to run as root
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- Priority class should be set
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Pod should be configured with a valid topology spread constraint
- The default /proc masks are set up to reduce attack surface, and should be required
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- Host IPC is not configured
Container kube-prometheus-stack:
- CPU limits should be set
- CPU requests should be set
- Memory requests should be set
- Image pull policy should be "Always"
- Memory limits should be set
- Host port is not configured
- Liveness probe is configured
- Container does not have any dangerous capabilities
- Filesystem is read only
- Readiness probe is configured
- Is not allowed to run as root
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Privilege escalation not allowed
- Image tag is specified
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- The ServiceAccount will be automounted
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Host network is not configured
Container kube-state-metrics:
- Image pull policy should be "Always"
- CPU requests should be set
- Memory limits should be set
- Memory requests should be set
- CPU limits should be set
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Liveness probe is configured
- Container does not have any dangerous capabilities
- Filesystem is read only
- Not running as privileged
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Host port is not configured
- Privilege escalation not allowed
- Readiness probe is configured
Spec: no checks applied
Spec:
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding references a Role that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: openfaas
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
Container gateway:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- The container sets potentially sensitive environment variables
- Filesystem should be read only
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory limits should be set
- CPU limits should be set
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- CPU requests are set
- Memory requests are set
- Readiness probe is configured
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- Liveness probe is configured
- Not running as privileged
Container faas-netes:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- The container sets potentially sensitive environment variables
- Container should not have insecure capabilities
- Filesystem should be read only
- Image pull policy should be "Always"
- CPU limits should be set
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Readiness probe should be configured
- Memory limits should be set
- CPU requests are set
- Container does not have any dangerous capabilities
- Host port is not configured
- Memory requests are set
- Image tag is specified
- Not running as privileged
- Liveness probe is configured
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- Pod should be configured with a valid topology spread constraint
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
Container nats:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory limits should be set
- Filesystem should be read only
- Readiness probe should be configured
- Image pull policy should be "Always"
- CPU limits should be set
- Liveness probe should be configured
- Container does not have any dangerous capabilities
- Host port is not configured
- Not running as privileged
- Image tag is specified
- CPU requests are set
- Memory requests are set
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host IPC is not configured
- Privileged access to the host check is valid
Container queue-worker:
- The container sets potentially sensitive environment variables
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory limits should be set
- Readiness probe should be configured
- CPU limits should be set
- Liveness probe should be configured
- Filesystem should be read only
- Image pull policy should be "Always"
- Not running as privileged
- CPU requests are set
- Container does not have any dangerous capabilities
- Host port is not configured
- Image tag is specified
- Memory requests are set
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Namespace: openfaas-fn
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- HostPath volumes are not configured
- Privileged access to the host check is valid
- The default /proc masks are set up to reduce attack surface, and should be required
Container my-node-fn:
- Should not be allowed to run as root
- Image tag should be specified
- Privilege escalation should not be allowed
- CPU limits should be set
- Filesystem should be read only
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- CPU requests should be set
- Memory requests should be set
- Container should not have insecure capabilities
- Memory limits should be set
- Readiness probe is configured
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
- Host port is not configured
- Image pull policy is "Always"
- Not running as privileged
- Container does not have any dangerous capabilities
Spec:
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
Spec: no checks applied
Namespace: tracing
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- HostPath volumes are not configured
- Privileged access to the host check is valid
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- The default /proc masks are set up to reduce attack surface, and should be required
Container jaeger:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Memory requests should be set
- CPU limits should be set
- Container should not have insecure capabilities
- Memory limits should be set
- Image pull policy should be "Always"
- Filesystem should be read only
- Readiness probe should be configured
- CPU requests should be set
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Liveness probe should be configured
- Host port is not configured
- Image tag is specified
- Not running as privileged
- Container does not have any dangerous capabilities
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Pod should be configured with a valid topology spread constraint
- Priority class should be set
- Host IPC is not configured
- Host PID is not configured
- HostPath volumes are not configured
- The default /proc masks are set up to reduce attack surface, and should be required
- Host network is not configured
- Privileged access to the host check is valid
Container otel-collector:
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- CPU limits should be set
- Liveness probe should be configured
- Image pull policy should be "Always"
- Memory requests should be set
- Filesystem should be read only
- Readiness probe should be configured
- CPU requests should be set
- Container should not have insecure capabilities
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory limits should be set
- Container does not have any dangerous capabilities
- Host port is not configured
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Not running as privileged