You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
JKube can generate Kubernetes deployment artifacts and deploy applications using those
artifacts. By default, many of the security features offered by Kubernetes are not enabled
in these artifacts. This can lead to the deployed applications having more permissions than
their workload requires. If such an application was compromised, the permissions would
enable the attacker to perform further attacks against the container or host.
Subtasks (To be evaluated one by one)
Pods have no associated network policies.
Dockerfiles have base image references that use the latest tag.
Container image references use the latest tag, or no tag, instead of a named tag
or a digest.
Resource (CPU, memory) limits are not set.
Containers have allowPrivilegeEscalation unset.
Containers are not configured to use a read-only filesystem.
Containers run as the root user, and have privileged capabilities.
Seccomp profiles are not enabled on containers.
Service account tokens are mounted on pods where they may not be needed.
Recommendations
The text was updated successfully, but these errors were encountered:
Description
Mirror of
TOB-JKUBE-1
.JKube can generate Kubernetes deployment artifacts and deploy applications using those
artifacts. By default, many of the security features offered by Kubernetes are not enabled
in these artifacts. This can lead to the deployed applications having more permissions than
their workload requires. If such an application was compromised, the permissions would
enable the attacker to perform further attacks against the container or host.
Subtasks (To be evaluated one by one)
or a digest.
Recommendations
The text was updated successfully, but these errors were encountered: