1 Star 0 Fork 13

xiao菜鸟/k8s 高可用集群 ansible 剧本部署

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
文件
克隆/下载
results.html 378.81 KB
一键复制 编辑 原始数据 按行查看 历史
山河已无恙 提交于 2023-02-05 23:52 . init
1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672
<!DOCTYPE html>
<html lang="en-US">
<head>
<meta charset="UTF-8">
<title>Kubescape Scan Report</title>
</head>
<style>
:root {
--cell-padding-vertical: 0.25em;
--cell-padding-horizontal: 0.25em;
--font-family-sans: system-ui, -apple-system, sans-serif;
}
body {
max-width: 60em;
margin: auto;
font-family: var(--font-family-sans);
}
table {
width: 100%;
border-top: 0.1em solid black;
border-bottom: 0.1em solid black;
border-collapse: collapse;
table-layout: fixed;
}
th {
text-align: left;
}
td, th {
padding-top: var(--cell-padding-vertical);
padding-bottom: var(--cell-padding-vertical);
padding-right: var(--cell-padding-horizontal);
vertical-align: top;
}
td > p {
margin: 0;
word-break: break-all;
hyphens: auto;
}
thead {
border-bottom: 0.01em solid black;
}
.numericCell {
text-align: right;
}
.controlSeverityCell {
width: 10%;
}
.controlNameCell {
width: 50%;
}
.controlRiskCell {
width: 10%;
}
.resourceSeverityCell {
width: 10%;
}
.resourceNameCell {
width: 30%;
}
.resourceURLCell {
width: 10%;
}
.resourceRemediationCell {
width: 50%;
}
.logo {
width: 25%;
float: right;
}
</style>
<body>
<img class="logo" src="https://raw.githubusercontent.com/kubescape/kubescape/master/core/pkg/resultshandling/printer/v2/pdf/logo.png">
<h1>Kubescape Scan Report</h1>
<h2>By Controls</h2>
<h3>Summary</h3>
<table>
<thead>
<tr>
<th>All</th>
<th>Failed</th>
<th>Excluded</th>
<th>Skipped</th>
</tr>
</thead>
<tbody>
<tr>
<td>174</td>
<td>77</td>
<td>3</td>
<td>3</td>
</tr>
</tbody>
</table>
<h3>Details</h3>
<table>
<thead>
<tr>
<th class="controlSeverityCell">Severity</th>
<th class="controlNameCell">Control Name</th>
<th class="controlRiskCell">Failed Resources</th>
<th class="controlRiskCell">Excluded Resources</th>
<th class="controlRiskCell">All Resources</th>
<th class="controlRiskCell">Risk Score, %</th>
</tr>
</thead>
<tbody>
<tr>
<td class="controlSeverityCell">Critical</td>
<td class="controlNameCell">API server insecure port is enabled</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Critical</td>
<td class="controlNameCell">CVE-2022-39328-grafana-auth-bypass</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Critical</td>
<td class="controlNameCell">Disable anonymous access to Kubelet service</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Critical</td>
<td class="controlNameCell">Enforce Kubelet client TLS authentication</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">16</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Applications credentials in configuration files</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">67</td>
<td class="controlRiskCell numericCell">4</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.1.11 Ensure that the etcd data directory permissions are set to 700 or more restrictive</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">33</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.1.12 Ensure that the etcd data directory ownership is set to etcd:etcd</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">33</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.1.13 Ensure that the admin.conf file permissions are set to 600</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.1.14 Ensure that the admin.conf file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.1.19 Ensure that the Kubernetes PKI directory and file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.1.21 Ensure that the Kubernetes PKI key file permissions are set to 600</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.1 Ensure that the API Server --anonymous-auth argument is set to false</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.10 Ensure that the admission control plugin AlwaysAdmit is not set</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.16 Ensure that the API Server --secure-port argument is not set to 0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.18 Ensure that the API Server --audit-log-path argument is set</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.2 Ensure that the API Server --token-auth-file parameter is not set</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.25 Ensure that the API Server --etcd-certfile and --etcd-keyfile arguments are set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.26 Ensure that the API Server --tls-cert-file and --tls-private-key-file arguments are set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.27 Ensure that the API Server --client-ca-file argument is set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.28 Ensure that the API Server --etcd-cafile argument is set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.29 Ensure that the API Server --encryption-provider-config argument is set as appropriate</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">50</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.30 Ensure that encryption providers are appropriately configured</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.4 Ensure that the API Server --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.5 Ensure that the API Server --kubelet-certificate-authority argument is set as appropriate</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.6 Ensure that the API Server --authorization-mode argument is not set to AlwaysAllow</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.2.8 Ensure that the API Server --authorization-mode argument includes RBAC</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-1.3.5 Ensure that the Controller Manager --root-ca-file argument is set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-2.1 Ensure that the --cert-file and --key-file arguments are set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-2.2 Ensure that the --client-cert-auth argument is set to true</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-2.4 Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-2.5 Ensure that the --peer-client-cert-auth argument is set to true</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-2.7 Ensure that a unique Certificate Authority is used for etcd</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">66</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-4.1.10 If the kubelet config.yaml configuration file is being used validate file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-4.1.8 Ensure that the client certificate authorities file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-4.1.9 If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-4.2.1 Ensure that the --anonymous-auth argument is set to false</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-4.2.10 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">16</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-5.1.1 Ensure that the cluster-admin role is only used where required</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-5.1.3 Minimize wildcard use in Roles and ClusterRoles</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-5.2.11 Minimize the admission of Windows HostProcess Containers</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-5.2.2 Minimize the admission of privileged containers</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="controlRiskCell numericCell">23</td>
<td class="controlRiskCell numericCell">17</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">56</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CVE-2022-23648-containerd-fs-escape</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">CVE-2022-47633-kyverno-signature-bypass</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Forbidden Container Registries</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Host PID/IPC privileges</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">HostNetwork access</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">13</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">19</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">HostPath mount</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">12</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">19</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Insecure capabilities</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">10</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Instance Metadata API</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">List Kubernetes secrets</td>
<td class="controlRiskCell numericCell">7</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">27</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Privileged container</td>
<td class="controlRiskCell numericCell">2</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">5</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">RBAC enabled</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Resource limits</td>
<td class="controlRiskCell numericCell">18</td>
<td class="controlRiskCell numericCell">15</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">44</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Resources CPU limit and request</td>
<td class="controlRiskCell numericCell">18</td>
<td class="controlRiskCell numericCell">15</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">44</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Resources memory limit and request</td>
<td class="controlRiskCell numericCell">18</td>
<td class="controlRiskCell numericCell">14</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">44</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Workloads with Critical vulnerabilities exposed to external traffic</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Workloads with RCE vulnerabilities exposed to external traffic</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">High</td>
<td class="controlNameCell">Writable hostPath mount</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">7</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">10</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Access container service account</td>
<td class="controlRiskCell numericCell">5</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">12</td>
<td class="controlRiskCell numericCell">42</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Allow privilege escalation</td>
<td class="controlRiskCell numericCell">16</td>
<td class="controlRiskCell numericCell">13</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">39</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Audit logs enabled</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Automatic mapping of service account</td>
<td class="controlRiskCell numericCell">33</td>
<td class="controlRiskCell numericCell">54</td>
<td class="controlRiskCell numericCell">97</td>
<td class="controlRiskCell numericCell">34</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.1 Ensure that the API server pod specification file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.10 Ensure that the Container Network Interface file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.15 Ensure that the scheduler.conf file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.16 Ensure that the scheduler.conf file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.17 Ensure that the controller-manager.conf file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.18 Ensure that the controller-manager.conf file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.2 Ensure that the API server pod specification file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.3 Ensure that the controller manager pod specification file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.4 Ensure that the controller manager pod specification file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.5 Ensure that the scheduler pod specification file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.6 Ensure that the scheduler pod specification file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.7 Ensure that the etcd pod specification file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.8 Ensure that the etcd pod specification file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.1.9 Ensure that the Container Network Interface file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.11 Ensure that the admission control plugin AlwaysPullImages is set</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.12 Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.15 Ensure that the admission control plugin NodeRestriction is set</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.19 Ensure that the API Server --audit-log-maxage argument is set to 30 or as appropriate</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.20 Ensure that the API Server --audit-log-maxbackup argument is set to 10 or as appropriate</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.21 Ensure that the API Server --audit-log-maxsize argument is set to 100 or as appropriate</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.22 Ensure that the API Server --request-timeout argument is set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.23 Ensure that the API Server --service-account-lookup argument is set to true</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.24 Ensure that the API Server --service-account-key-file argument is set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.3 Ensure that the API Server --DenyServiceExternalIPs is not set</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.31 Ensure that the API Server only makes use of Strong Cryptographic Ciphers</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.7 Ensure that the API Server --authorization-mode argument includes Node</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.2.9 Ensure that the admission control plugin EventRateLimit is set</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.3.1 Ensure that the Controller Manager --terminated-pod-gc-threshold argument is set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.3.3 Ensure that the Controller Manager --use-service-account-credentials argument is set to true</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.3.4 Ensure that the Controller Manager --service-account-private-key-file argument is set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.3.6 Ensure that the Controller Manager RotateKubeletServerCertificate argument is set to true</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.3.7 Ensure that the Controller Manager --bind-address argument is set to 127.0.0.1</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-1.4.2 Ensure that the Scheduler --bind-address argument is set to 127.0.0.1</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-2.3 Ensure that the --auto-tls argument is not set to true</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-2.6 Ensure that the --peer-auto-tls argument is not set to true</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-3.2.1 Ensure that a minimal audit policy is created</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-3.2.2 Ensure that the audit policy covers key security concerns</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.1.2 Ensure that the kubelet service file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.1.3 If proxy kubeconfig file exists ensure permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.1.4 If proxy kubeconfig file exists ensure ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.1.5 Ensure that the --kubeconfig kubelet.conf file permissions are set to 600 or more restrictive</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.1.6 Ensure that the --kubeconfig kubelet.conf file ownership is set to root:root</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.2.11 Ensure that the --rotate-certificates argument is not set to false</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.2.12 Verify that the RotateKubeletServerCertificate argument is set to true</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.2.13 Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.2.2 Ensure that the --authorization-mode argument is not set to AlwaysAllow</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.2.3 Ensure that the --client-ca-file argument is set as appropriate</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-4.2.4 Verify that the --read-only-port argument is set to 0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.1.2 Minimize access to secrets</td>
<td class="controlRiskCell numericCell">7</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">27</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.1.4 Minimize access to create pods</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.1.5 Ensure that default service accounts are not actively used</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">20</td>
<td class="controlRiskCell numericCell">30</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="controlRiskCell numericCell">36</td>
<td class="controlRiskCell numericCell">51</td>
<td class="controlRiskCell numericCell">97</td>
<td class="controlRiskCell numericCell">37</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.1.8 Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes cluster</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.1 Ensure that the cluster has at least one active policy control mechanism in place</td>
<td class="controlRiskCell numericCell">5</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">50</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.10 Minimize the admission of containers with capabilities assigned</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.12 Minimize the admission of HostPath volumes</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.13 Minimize the admission of containers which use HostPorts</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.3 Minimize the admission of containers wishing to share the host process ID namespace</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.4 Minimize the admission of containers wishing to share the host IPC namespace</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.5 Minimize the admission of containers wishing to share the host network namespace</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.6 Minimize the admission of containers with allowPrivilegeEscalation</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.7 Minimize the admission of root containers</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.8 Minimize the admission of containers with the NET_RAW capability</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.2.9 Minimize the admission of containers with added capabilities</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.3.1 Ensure that the CNI in use supports Network Policies</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.3.2 Ensure that all Namespaces have Network Policies defined</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.4.1 Prefer using secrets as files over secrets as environment variables</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">2</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.4.2 Consider external secret storage</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.7.1 Create administrative boundaries between resources using namespaces</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="controlRiskCell numericCell">20</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">49</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CIS-5.7.4 The default namespace should not be used</td>
<td class="controlRiskCell numericCell">7</td>
<td class="controlRiskCell numericCell">2</td>
<td class="controlRiskCell numericCell">211</td>
<td class="controlRiskCell numericCell">3</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CVE-2021-25741 - Using symlink for arbitrary host file system access.</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CVE-2022-0185-linux-kernel-container-escape</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="controlRiskCell numericCell">15</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">36</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CVE-2022-24348-argocddirtraversal</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Cluster internal networking</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Cluster-admin binding</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Configured liveness probe</td>
<td class="controlRiskCell numericCell">12</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">29</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Container hostPort</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">2</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Containers mounting Docker socket</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">CoreDNS poisoning</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">4</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Data Destruction</td>
<td class="controlRiskCell numericCell">2</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">8</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Delete Kubernetes events</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Exec into container</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Exposed sensitive interfaces</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Images from allowed registry</td>
<td class="controlRiskCell numericCell">23</td>
<td class="controlRiskCell numericCell">17</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">56</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Ingress and Egress blocked</td>
<td class="controlRiskCell numericCell">20</td>
<td class="controlRiskCell numericCell">20</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">49</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Linux hardening</td>
<td class="controlRiskCell numericCell">17</td>
<td class="controlRiskCell numericCell">7</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">41</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Malicious admission controller (mutating)</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Mount service principal</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">No impersonation</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Non-root containers</td>
<td class="controlRiskCell numericCell">17</td>
<td class="controlRiskCell numericCell">14</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">41</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Portforwarding privileges</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">26</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Secret/ETCD encryption enabled</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Sudo in container entrypoint</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Medium</td>
<td class="controlNameCell">Workloads with excessive amount of vulnerabilities</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">Access Kubernetes dashboard</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">66</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CIS-1.2.13 Ensure that the admission control plugin ServiceAccount is set</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CIS-1.2.14 Ensure that the admission control plugin NamespaceLifecycle is set</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CIS-1.2.17 Ensure that the API Server --profiling argument is set to false</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CIS-1.3.2 Ensure that the Controller Manager --profiling argument is set to false</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CIS-1.4.1 Ensure that the Scheduler --profiling argument is set to false</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CIS-4.2.5 Ensure that the --streaming-connection-idle-timeout argument is not set to 0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CIS-4.2.6 Ensure that the --protect-kernel-defaults argument is set to true</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CIS-4.2.7 Ensure that the --make-iptables-util-chains argument is set to true</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CIS-4.2.8 Ensure that the --hostname-override argument is not set</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CIS-4.2.9 Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">8</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">CVE-2022-3172-aggregated-API-server-redirect</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">Configured readiness probe</td>
<td class="controlRiskCell numericCell">15</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">36</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">Image pull policy on latest tag</td>
<td class="controlRiskCell numericCell">2</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">5</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">Immutable container filesystem</td>
<td class="controlRiskCell numericCell">18</td>
<td class="controlRiskCell numericCell">18</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">44</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">K8s common labels usage</td>
<td class="controlRiskCell numericCell">15</td>
<td class="controlRiskCell numericCell">15</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">36</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">Kubernetes CronJob</td>
<td class="controlRiskCell numericCell">2</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">2</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">Label usage for resources</td>
<td class="controlRiskCell numericCell">15</td>
<td class="controlRiskCell numericCell">3</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">36</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">Malicious admission controller (validating)</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">Naked PODs</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">66</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">Network mapping</td>
<td class="controlRiskCell numericCell">6</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">10</td>
<td class="controlRiskCell numericCell">60</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">PSP enabled</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">1</td>
<td class="controlRiskCell numericCell">100</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">Pods in default namespace</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">40</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tr>
<td class="controlSeverityCell">Low</td>
<td class="controlNameCell">SSH server running inside container</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">0</td>
<td class="controlRiskCell numericCell">4</td>
<td class="controlRiskCell numericCell">0</td>
</tr>
</tr>
<tbody>
</table>
<h2>By Resource</h2>
<h3>Name: vms107.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: KubeletInfo</p>
<p>Name: vms107.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0168">C-0168</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.2.12 Verify that the RotateKubeletServerCertificate argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0183">C-0183</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.9 If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0170">C-0170</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.7 Ensure that the --make-iptables-util-chains argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0178">C-0178</a></td>
<td class="resourceRemediationCell"> <p>makeIPTablesUtilChains</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.6 Ensure that the --protect-kernel-defaults argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0177">C-0177</a></td>
<td class="resourceRemediationCell"> <p>protectKernelDefaults</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0162">C-0162</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: vms108.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: KubeletInfo</p>
<p>Name: vms108.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0168">C-0168</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.2.12 Verify that the RotateKubeletServerCertificate argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0183">C-0183</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.9 If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0170">C-0170</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.7 Ensure that the --make-iptables-util-chains argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0178">C-0178</a></td>
<td class="resourceRemediationCell"> <p>makeIPTablesUtilChains</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.6 Ensure that the --protect-kernel-defaults argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0177">C-0177</a></td>
<td class="resourceRemediationCell"> <p>protectKernelDefaults</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0162">C-0162</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: cadvisor</h3>
<p>ApiVersion: v1</p>
<p>Kind: Namespace</p>
<p>Name: cadvisor</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Network mapping</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0049">C-0049</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.1 Create administrative boundaries between resources using namespaces</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0209">C-0209</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.1 Ensure that the cluster has at least one active policy control mechanism in place</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0192">C-0192</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.4 Minimize the admission of containers wishing to share the host IPC namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0195">C-0195</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.6 Minimize the admission of containers with allowPrivilegeEscalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0197">C-0197</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.3.2 Ensure that all Namespaces have Network Policies defined</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0206">C-0206</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.13 Minimize the admission of containers which use HostPorts</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0204">C-0204</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.3 Minimize the admission of containers wishing to share the host process ID namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0194">C-0194</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.7 Minimize the admission of root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0198">C-0198</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.9 Minimize the admission of containers with added capabilities</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0200">C-0200</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.12 Minimize the admission of HostPath volumes</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0203">C-0203</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.8 Minimize the admission of containers with the NET_RAW capability</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0199">C-0199</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.10 Minimize the admission of containers with capabilities assigned</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0201">C-0201</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Cluster internal networking</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0054">C-0054</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.2 Minimize the admission of privileged containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0193">C-0193</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.5 Minimize the admission of containers wishing to share the host network namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0196">C-0196</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.11 Minimize the admission of Windows HostProcess Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0202">C-0202</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: ingress-nginx</h3>
<p>ApiVersion: v1</p>
<p>Kind: Namespace</p>
<p>Name: ingress-nginx</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Network mapping</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0049">C-0049</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.1 Create administrative boundaries between resources using namespaces</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0209">C-0209</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.1 Ensure that the cluster has at least one active policy control mechanism in place</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0192">C-0192</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.4 Minimize the admission of containers wishing to share the host IPC namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0195">C-0195</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.6 Minimize the admission of containers with allowPrivilegeEscalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0197">C-0197</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.3.2 Ensure that all Namespaces have Network Policies defined</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0206">C-0206</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.13 Minimize the admission of containers which use HostPorts</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0204">C-0204</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.3 Minimize the admission of containers wishing to share the host process ID namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0194">C-0194</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.7 Minimize the admission of root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0198">C-0198</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.9 Minimize the admission of containers with added capabilities</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0200">C-0200</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.12 Minimize the admission of HostPath volumes</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0203">C-0203</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.8 Minimize the admission of containers with the NET_RAW capability</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0199">C-0199</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.10 Minimize the admission of containers with capabilities assigned</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0201">C-0201</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Cluster internal networking</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0054">C-0054</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.2 Minimize the admission of privileged containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0193">C-0193</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.5 Minimize the admission of containers wishing to share the host network namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0196">C-0196</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.11 Minimize the admission of Windows HostProcess Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0202">C-0202</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: vms102.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: KubeletInfo</p>
<p>Name: vms102.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0168">C-0168</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.2.12 Verify that the RotateKubeletServerCertificate argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0183">C-0183</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.9 If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0170">C-0170</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.7 Ensure that the --make-iptables-util-chains argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0178">C-0178</a></td>
<td class="resourceRemediationCell"> <p>makeIPTablesUtilChains</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.6 Ensure that the --protect-kernel-defaults argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0177">C-0177</a></td>
<td class="resourceRemediationCell"> <p>protectKernelDefaults</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0162">C-0162</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: vms105.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: KubeletInfo</p>
<p>Name: vms105.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0168">C-0168</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.2.12 Verify that the RotateKubeletServerCertificate argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0183">C-0183</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.9 If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0170">C-0170</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.7 Ensure that the --make-iptables-util-chains argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0178">C-0178</a></td>
<td class="resourceRemediationCell"> <p>makeIPTablesUtilChains</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.6 Ensure that the --protect-kernel-defaults argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0177">C-0177</a></td>
<td class="resourceRemediationCell"> <p>protectKernelDefaults</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0162">C-0162</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kubescape</h3>
<p>ApiVersion: v1</p>
<p>Kind: Namespace</p>
<p>Name: kubescape</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Network mapping</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0049">C-0049</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.1 Create administrative boundaries between resources using namespaces</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0209">C-0209</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.1 Ensure that the cluster has at least one active policy control mechanism in place</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0192">C-0192</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.4 Minimize the admission of containers wishing to share the host IPC namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0195">C-0195</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.6 Minimize the admission of containers with allowPrivilegeEscalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0197">C-0197</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.3.2 Ensure that all Namespaces have Network Policies defined</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0206">C-0206</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.13 Minimize the admission of containers which use HostPorts</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0204">C-0204</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.3 Minimize the admission of containers wishing to share the host process ID namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0194">C-0194</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.7 Minimize the admission of root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0198">C-0198</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.9 Minimize the admission of containers with added capabilities</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0200">C-0200</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.12 Minimize the admission of HostPath volumes</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0203">C-0203</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.8 Minimize the admission of containers with the NET_RAW capability</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0199">C-0199</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.10 Minimize the admission of containers with capabilities assigned</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0201">C-0201</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Cluster internal networking</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0054">C-0054</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.2 Minimize the admission of privileged containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0193">C-0193</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.5 Minimize the admission of containers wishing to share the host network namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0196">C-0196</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.11 Minimize the admission of Windows HostProcess Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0202">C-0202</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: vms102.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: ControlPlaneInfo</p>
<p>Name: vms102.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0111">C-0111</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: metallb-system</h3>
<p>ApiVersion: v1</p>
<p>Kind: Namespace</p>
<p>Name: metallb-system</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Network mapping</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0049">C-0049</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.1 Create administrative boundaries between resources using namespaces</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0209">C-0209</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.4 Minimize the admission of containers wishing to share the host IPC namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0195">C-0195</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.6 Minimize the admission of containers with allowPrivilegeEscalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0197">C-0197</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.3.2 Ensure that all Namespaces have Network Policies defined</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0206">C-0206</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.13 Minimize the admission of containers which use HostPorts</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0204">C-0204</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.3 Minimize the admission of containers wishing to share the host process ID namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0194">C-0194</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.7 Minimize the admission of root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0198">C-0198</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.9 Minimize the admission of containers with added capabilities</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0200">C-0200</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.12 Minimize the admission of HostPath volumes</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0203">C-0203</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.8 Minimize the admission of containers with the NET_RAW capability</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0199">C-0199</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.10 Minimize the admission of containers with capabilities assigned</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0201">C-0201</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Cluster internal networking</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0054">C-0054</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.2 Minimize the admission of privileged containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0193">C-0193</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.5 Minimize the admission of containers wishing to share the host network namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0196">C-0196</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.11 Minimize the admission of Windows HostProcess Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0202">C-0202</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: vms106.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: KubeletInfo</p>
<p>Name: vms106.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0168">C-0168</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.2.12 Verify that the RotateKubeletServerCertificate argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0183">C-0183</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.9 If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0170">C-0170</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.7 Ensure that the --make-iptables-util-chains argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0178">C-0178</a></td>
<td class="resourceRemediationCell"> <p>makeIPTablesUtilChains</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.6 Ensure that the --protect-kernel-defaults argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0177">C-0177</a></td>
<td class="resourceRemediationCell"> <p>protectKernelDefaults</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0162">C-0162</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: vms101.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: ControlPlaneInfo</p>
<p>Name: vms101.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0111">C-0111</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: vms103.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: KubeletInfo</p>
<p>Name: vms103.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0168">C-0168</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.2.12 Verify that the RotateKubeletServerCertificate argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0183">C-0183</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.9 If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0170">C-0170</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.7 Ensure that the --make-iptables-util-chains argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0178">C-0178</a></td>
<td class="resourceRemediationCell"> <p>makeIPTablesUtilChains</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.6 Ensure that the --protect-kernel-defaults argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0177">C-0177</a></td>
<td class="resourceRemediationCell"> <p>protectKernelDefaults</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0162">C-0162</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: vms100.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: ControlPlaneInfo</p>
<p>Name: vms100.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.1.11 Ensure that the etcd data directory permissions are set to 700 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0102">C-0102</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0111">C-0111</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.1.12 Ensure that the etcd data directory ownership is set to etcd:etcd</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0103">C-0103</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: system:bootstrappers:kubeadm:default-node-token</h3>
<p>ApiVersion: rbac.authorization.k8s.io</p>
<p>Kind: Group</p>
<p>Name: system:bootstrappers:kubeadm:default-node-token</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">List Kubernetes secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0015">C-0015</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[0]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.2 Minimize access to secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0186">C-0186</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[0]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: vms100.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: KubeletInfo</p>
<p>Name: vms100.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0168">C-0168</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.2.12 Verify that the RotateKubeletServerCertificate argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0183">C-0183</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.9 If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0170">C-0170</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.7 Ensure that the --make-iptables-util-chains argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0178">C-0178</a></td>
<td class="resourceRemediationCell"> <p>makeIPTablesUtilChains</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.6 Ensure that the --protect-kernel-defaults argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0177">C-0177</a></td>
<td class="resourceRemediationCell"> <p>protectKernelDefaults</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0162">C-0162</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: velero</h3>
<p>ApiVersion: v1</p>
<p>Kind: Namespace</p>
<p>Name: velero</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Network mapping</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0049">C-0049</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.1 Create administrative boundaries between resources using namespaces</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0209">C-0209</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.1 Ensure that the cluster has at least one active policy control mechanism in place</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0192">C-0192</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.4 Minimize the admission of containers wishing to share the host IPC namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0195">C-0195</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.6 Minimize the admission of containers with allowPrivilegeEscalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0197">C-0197</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.3.2 Ensure that all Namespaces have Network Policies defined</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0206">C-0206</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.13 Minimize the admission of containers which use HostPorts</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0204">C-0204</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.3 Minimize the admission of containers wishing to share the host process ID namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0194">C-0194</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.7 Minimize the admission of root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0198">C-0198</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.9 Minimize the admission of containers with added capabilities</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0200">C-0200</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.12 Minimize the admission of HostPath volumes</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0203">C-0203</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.8 Minimize the admission of containers with the NET_RAW capability</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0199">C-0199</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.10 Minimize the admission of containers with capabilities assigned</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0201">C-0201</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Cluster internal networking</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0054">C-0054</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.2 Minimize the admission of privileged containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0193">C-0193</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.5 Minimize the admission of containers wishing to share the host network namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0196">C-0196</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.11 Minimize the admission of Windows HostProcess Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0202">C-0202</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: vms101.liruilongs.github.io</h3>
<p>ApiVersion: hostdata.kubescape.cloud/v1beta0</p>
<p>Kind: KubeletInfo</p>
<p>Name: vms101.liruilongs.github.io</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0168">C-0168</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.2.12 Verify that the RotateKubeletServerCertificate argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0183">C-0183</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-4.1.9 If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0170">C-0170</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.7 Ensure that the --make-iptables-util-chains argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0178">C-0178</a></td>
<td class="resourceRemediationCell"> <p>makeIPTablesUtilChains</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-4.2.6 Ensure that the --protect-kernel-defaults argument is set to true</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0177">C-0177</a></td>
<td class="resourceRemediationCell"> <p>protectKernelDefaults</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0162">C-0162</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: local-path-storage</h3>
<p>ApiVersion: v1</p>
<p>Kind: Namespace</p>
<p>Name: local-path-storage</p>
<p>Namespace: </p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Network mapping</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0049">C-0049</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.1 Create administrative boundaries between resources using namespaces</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0209">C-0209</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.1 Ensure that the cluster has at least one active policy control mechanism in place</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0192">C-0192</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.4 Minimize the admission of containers wishing to share the host IPC namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0195">C-0195</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.6 Minimize the admission of containers with allowPrivilegeEscalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0197">C-0197</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.3.2 Ensure that all Namespaces have Network Policies defined</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0206">C-0206</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.13 Minimize the admission of containers which use HostPorts</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0204">C-0204</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.3 Minimize the admission of containers wishing to share the host process ID namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0194">C-0194</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.7 Minimize the admission of root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0198">C-0198</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.9 Minimize the admission of containers with added capabilities</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0200">C-0200</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.12 Minimize the admission of HostPath volumes</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0203">C-0203</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.8 Minimize the admission of containers with the NET_RAW capability</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0199">C-0199</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.10 Minimize the admission of containers with capabilities assigned</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0201">C-0201</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=restricted</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Cluster internal networking</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0054">C-0054</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.2 Minimize the admission of privileged containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0193">C-0193</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.2.5 Minimize the admission of containers wishing to share the host network namespace</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0196">C-0196</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.2.11 Minimize the admission of Windows HostProcess Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0202">C-0202</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels[pod-security.kubernetes.io/enforce]=baseline</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: default</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: default</p>
<p>Namespace: cadvisor</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.5 Ensure that default service accounts are not actively used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0189">C-0189</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: cadvisor</h3>
<p>ApiVersion: apps/v1</p>
<p>Kind: DaemonSet</p>
<p>Name: cadvisor</p>
<p>Namespace: cadvisor</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0048">C-0048</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.volumes[4].hostPath.path</p> <p>spec.template.spec.volumes[5].hostPath.path</p> <p>spec.template.spec.volumes[1].hostPath.path</p> <p>spec.template.spec.volumes[2].hostPath.path</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.privileged</p> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Privileged container</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0057">C-0057</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.privileged</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: cadvisor</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: cadvisor</p>
<p>Namespace: cadvisor</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kube-prometheus-stack-admission</h3>
<p>ApiVersion: </p>
<p>Kind: ServiceAccount</p>
<p>Name: kube-prometheus-stack-admission</p>
<p>Namespace: default</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">List Kubernetes secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0015">C-0015</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[0]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.2 Minimize access to secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0186">C-0186</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[0]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Access container service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0053">C-0053</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kubernetes</h3>
<p>ApiVersion: v1</p>
<p>Kind: Endpoints</p>
<p>Name: kubernetes</p>
<p>Namespace: default</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.4 The default namespace should not be used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0212">C-0212</a></td>
<td class="resourceRemediationCell"> <p>metadata.namespace</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kubernetes</h3>
<p>ApiVersion: v1</p>
<p>Kind: Service</p>
<p>Name: kubernetes</p>
<p>Namespace: default</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.4 The default namespace should not be used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0212">C-0212</a></td>
<td class="resourceRemediationCell"> <p>metadata.namespace</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kube-prometheus-stack-admission</h3>
<p>ApiVersion: rbac.authorization.k8s.io/v1</p>
<p>Kind: Role</p>
<p>Name: kube-prometheus-stack-admission</p>
<p>Namespace: default</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.4 The default namespace should not be used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0212">C-0212</a></td>
<td class="resourceRemediationCell"> <p>metadata.namespace</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: release-name-kube-promethe-admission</h3>
<p>ApiVersion: v1</p>
<p>Kind: Secret</p>
<p>Name: release-name-kube-promethe-admission</p>
<p>Namespace: default</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.4 The default namespace should not be used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0212">C-0212</a></td>
<td class="resourceRemediationCell"> <p>metadata.namespace</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: sh.helm.release.v1.kube-prometheus-stack.v1</h3>
<p>ApiVersion: v1</p>
<p>Kind: Secret</p>
<p>Name: sh.helm.release.v1.kube-prometheus-stack.v1</p>
<p>Namespace: default</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.4 The default namespace should not be used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0212">C-0212</a></td>
<td class="resourceRemediationCell"> <p>metadata.namespace</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kube-prometheus-stack-admission</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: kube-prometheus-stack-admission</p>
<p>Namespace: default</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.4 The default namespace should not be used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0212">C-0212</a></td>
<td class="resourceRemediationCell"> <p>metadata.namespace</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kube-prometheus-stack-admission</h3>
<p>ApiVersion: rbac.authorization.k8s.io/v1</p>
<p>Kind: RoleBinding</p>
<p>Name: kube-prometheus-stack-admission</p>
<p>Namespace: default</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.4 The default namespace should not be used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0212">C-0212</a></td>
<td class="resourceRemediationCell"> <p>metadata.namespace</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: ingress-nginx</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: ingress-nginx</p>
<p>Namespace: ingress-nginx</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: ingress-nginx-admission</h3>
<p>ApiVersion: </p>
<p>Kind: ServiceAccount</p>
<p>Name: ingress-nginx-admission</p>
<p>Namespace: ingress-nginx</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">List Kubernetes secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0015">C-0015</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[0]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.2 Minimize access to secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0186">C-0186</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[0]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Access container service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0053">C-0053</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: ingress-nginx-admission</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: ingress-nginx-admission</p>
<p>Namespace: ingress-nginx</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: ingress-nginx-admission-create</h3>
<p>ApiVersion: batch/v1</p>
<p>Kind: Job</p>
<p>Name: ingress-nginx-admission-create</p>
<p>Namespace: ingress-nginx</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: default</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: default</p>
<p>Namespace: ingress-nginx</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.5 Ensure that default service accounts are not actively used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0189">C-0189</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: ingress-nginx</h3>
<p>ApiVersion: </p>
<p>Kind: ServiceAccount</p>
<p>Name: ingress-nginx</p>
<p>Namespace: ingress-nginx</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">List Kubernetes secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0015">C-0015</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[1].resources[2]</p> <p>relatedObjects[1].rules[1].verbs[0]</p> <p>relatedObjects[1].rules[1].verbs[1]</p> <p>relatedObjects[1].rules[1].verbs[2]</p> <p>relatedObjects[1].rules[1].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.2 Minimize access to secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0186">C-0186</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[1].resources[2]</p> <p>relatedObjects[1].rules[1].verbs[0]</p> <p>relatedObjects[1].rules[1].verbs[1]</p> <p>relatedObjects[1].rules[1].verbs[2]</p> <p>relatedObjects[1].rules[1].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Access container service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0053">C-0053</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: ingress-nginx-controller</h3>
<p>ApiVersion: apps/v1</p>
<p>Kind: Deployment</p>
<p>Name: ingress-nginx-controller</p>
<p>Namespace: ingress-nginx</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation</p> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.container[0].securityContext.allowPrivilegeEscalation</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: ingress-nginx-admission-patch</h3>
<p>ApiVersion: batch/v1</p>
<p>Kind: Job</p>
<p>Name: ingress-nginx-admission-patch</p>
<p>Namespace: ingress-nginx</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: haproxy-vms102.liruilongs.github.io</h3>
<p>ApiVersion: v1</p>
<p>Kind: Pod</p>
<p>Name: haproxy-vms102.liruilongs.github.io</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0048">C-0048</a></td>
<td class="resourceRemediationCell"> <p>spec.volumes[0].hostPath.path</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.securityContext.runAsNonRoot=true</p> <p>spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostNetwork access</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0041">C-0041</a></td>
<td class="resourceRemediationCell"> <p>spec.hostNetwork</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: keepalived-vms101.liruilongs.github.io</h3>
<p>ApiVersion: v1</p>
<p>Kind: Pod</p>
<p>Name: keepalived-vms101.liruilongs.github.io</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Writable hostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0045">C-0045</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].volumeMounts[1].readOnly=true</p> <p>spec.containers[0].volumeMounts[0].readOnly=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0048">C-0048</a></td>
<td class="resourceRemediationCell"> <p>spec.volumes[1].hostPath.path</p> <p>spec.volumes[0].hostPath.path</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.securityContext.runAsNonRoot=true</p> <p>spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Insecure capabilities</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0046">C-0046</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.capabilities.add[0]</p> <p>spec.containers[0].securityContext.capabilities.add[2]</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostNetwork access</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0041">C-0041</a></td>
<td class="resourceRemediationCell"> <p>spec.hostNetwork</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kube-apiserver-vms102.liruilongs.github.io</h3>
<p>ApiVersion: v1</p>
<p>Kind: Pod</p>
<p>Name: kube-apiserver-vms102.liruilongs.github.io</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.11 Ensure that the admission control plugin AlwaysPullImages is set</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0123">C-0123</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[5]</p> <p>spec.containers[0].command[5]=--enable-admission-plugins=NodeRestriction,AlwaysPullImages</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.19 Ensure that the API Server --audit-log-maxage argument is set to 30 or as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0131">C-0131</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--audit-log-maxage=30</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-3.2.1 Ensure that a minimal audit policy is created</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0160">C-0160</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.5 Ensure that the API Server --kubelet-certificate-authority argument is set as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0117">C-0117</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--kubelet-certificate-authority=&lt;path/to/ca.crt&gt;</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.29 Ensure that the API Server --encryption-provider-config argument is set as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0141">C-0141</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--encryption-provider-config=&lt;path/to/encryption-config.yaml&gt;</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.1 Ensure that the API Server --anonymous-auth argument is set to false</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0113">C-0113</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--anonymous-auth=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.31 Ensure that the API Server only makes use of Strong Cryptographic Ciphers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0143">C-0143</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_RSA_WITH_3DES_EDE_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_GCM_SHA384</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.18 Ensure that the API Server --audit-log-path argument is set</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0130">C-0130</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--audit-log-path=/var/log/apiserver/audit.log</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.9 Ensure that the admission control plugin EventRateLimit is set</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0121">C-0121</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[5]</p> <p>spec.containers[0].command[5]=--enable-admission-plugins=NodeRestriction,EventRateLimit</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.20 Ensure that the API Server --audit-log-maxbackup argument is set to 10 or as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0132">C-0132</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]</p> <p>spec.containers[0].command[28]=--audit-log-maxbackup=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.12 Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0124">C-0124</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[5]</p> <p>spec.containers[0].command[5]=--enable-admission-plugins=NodeRestriction,SecurityContextDeny</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.21 Ensure that the API Server --audit-log-maxsize argument is set to 100 or as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0133">C-0133</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]</p> <p>spec.containers[0].command[28]=--audit-log-maxsize=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-1.2.17 Ensure that the API Server --profiling argument is set to false</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0129">C-0129</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--profiling=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: calico-node</h3>
<p>ApiVersion: apps/v1</p>
<p>Kind: DaemonSet</p>
<p>Name: calico-node</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Writable hostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0045">C-0045</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].volumeMounts[0].readOnly=true</p> <p>spec.template.spec.containers[0].volumeMounts[5].readOnly=true</p> <p>spec.template.spec.containers[0].volumeMounts[4].readOnly=true</p> <p>spec.template.spec.containers[0].volumeMounts[3].readOnly=true</p> <p>spec.template.spec.containers[0].volumeMounts[2].readOnly=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0048">C-0048</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.volumes[8].hostPath.path</p> <p>spec.template.spec.volumes[7].hostPath.path</p> <p>spec.template.spec.volumes[9].hostPath.path</p> <p>spec.template.spec.volumes[10].hostPath.path</p> <p>spec.template.spec.volumes[2].hostPath.path</p> <p>spec.template.spec.volumes[1].hostPath.path</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.privileged</p> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Privileged container</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0057">C-0057</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.privileged</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostNetwork access</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0041">C-0041</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.hostNetwork</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: calico-node</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: calico-node</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: haproxy-vms101.liruilongs.github.io</h3>
<p>ApiVersion: v1</p>
<p>Kind: Pod</p>
<p>Name: haproxy-vms101.liruilongs.github.io</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0048">C-0048</a></td>
<td class="resourceRemediationCell"> <p>spec.volumes[0].hostPath.path</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.securityContext.runAsNonRoot=true</p> <p>spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostNetwork access</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0041">C-0041</a></td>
<td class="resourceRemediationCell"> <p>spec.hostNetwork</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: calico-kube-controllers</h3>
<p>ApiVersion: apps/v1</p>
<p>Kind: Deployment</p>
<p>Name: calico-kube-controllers</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.securityContext.runAsNonRoot=true</p> <p>spec.template.spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: keepalived-vms100.liruilongs.github.io</h3>
<p>ApiVersion: v1</p>
<p>Kind: Pod</p>
<p>Name: keepalived-vms100.liruilongs.github.io</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Writable hostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0045">C-0045</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].volumeMounts[1].readOnly=true</p> <p>spec.containers[0].volumeMounts[0].readOnly=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0048">C-0048</a></td>
<td class="resourceRemediationCell"> <p>spec.volumes[1].hostPath.path</p> <p>spec.volumes[0].hostPath.path</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.securityContext.runAsNonRoot=true</p> <p>spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Insecure capabilities</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0046">C-0046</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.capabilities.add[0]</p> <p>spec.containers[0].securityContext.capabilities.add[2]</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostNetwork access</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0041">C-0041</a></td>
<td class="resourceRemediationCell"> <p>spec.hostNetwork</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: calico-kube-controllers</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: calico-kube-controllers</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kube-apiserver-vms101.liruilongs.github.io</h3>
<p>ApiVersion: v1</p>
<p>Kind: Pod</p>
<p>Name: kube-apiserver-vms101.liruilongs.github.io</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.11 Ensure that the admission control plugin AlwaysPullImages is set</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0123">C-0123</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[5]</p> <p>spec.containers[0].command[5]=--enable-admission-plugins=NodeRestriction,AlwaysPullImages</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.19 Ensure that the API Server --audit-log-maxage argument is set to 30 or as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0131">C-0131</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--audit-log-maxage=30</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-3.2.1 Ensure that a minimal audit policy is created</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0160">C-0160</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.5 Ensure that the API Server --kubelet-certificate-authority argument is set as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0117">C-0117</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--kubelet-certificate-authority=&lt;path/to/ca.crt&gt;</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.29 Ensure that the API Server --encryption-provider-config argument is set as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0141">C-0141</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--encryption-provider-config=&lt;path/to/encryption-config.yaml&gt;</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.1 Ensure that the API Server --anonymous-auth argument is set to false</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0113">C-0113</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--anonymous-auth=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.31 Ensure that the API Server only makes use of Strong Cryptographic Ciphers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0143">C-0143</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_RSA_WITH_3DES_EDE_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_GCM_SHA384</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.18 Ensure that the API Server --audit-log-path argument is set</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0130">C-0130</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--audit-log-path=/var/log/apiserver/audit.log</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.9 Ensure that the admission control plugin EventRateLimit is set</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0121">C-0121</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[5]</p> <p>spec.containers[0].command[5]=--enable-admission-plugins=NodeRestriction,EventRateLimit</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.20 Ensure that the API Server --audit-log-maxbackup argument is set to 10 or as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0132">C-0132</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]</p> <p>spec.containers[0].command[28]=--audit-log-maxbackup=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.12 Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0124">C-0124</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[5]</p> <p>spec.containers[0].command[5]=--enable-admission-plugins=NodeRestriction,SecurityContextDeny</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.21 Ensure that the API Server --audit-log-maxsize argument is set to 100 or as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0133">C-0133</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]</p> <p>spec.containers[0].command[28]=--audit-log-maxsize=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-1.2.17 Ensure that the API Server --profiling argument is set to false</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0129">C-0129</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--profiling=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: keepalived-vms102.liruilongs.github.io</h3>
<p>ApiVersion: v1</p>
<p>Kind: Pod</p>
<p>Name: keepalived-vms102.liruilongs.github.io</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Writable hostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0045">C-0045</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].volumeMounts[1].readOnly=true</p> <p>spec.containers[0].volumeMounts[0].readOnly=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0048">C-0048</a></td>
<td class="resourceRemediationCell"> <p>spec.volumes[1].hostPath.path</p> <p>spec.volumes[0].hostPath.path</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.securityContext.runAsNonRoot=true</p> <p>spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Insecure capabilities</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0046">C-0046</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.capabilities.add[0]</p> <p>spec.containers[0].securityContext.capabilities.add[2]</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostNetwork access</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0041">C-0041</a></td>
<td class="resourceRemediationCell"> <p>spec.hostNetwork</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: haproxy-vms100.liruilongs.github.io</h3>
<p>ApiVersion: v1</p>
<p>Kind: Pod</p>
<p>Name: haproxy-vms100.liruilongs.github.io</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostPath mount</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0048">C-0048</a></td>
<td class="resourceRemediationCell"> <p>spec.volumes[0].hostPath.path</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.securityContext.runAsNonRoot=true</p> <p>spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostNetwork access</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0041">C-0041</a></td>
<td class="resourceRemediationCell"> <p>spec.hostNetwork</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kube-apiserver-vms100.liruilongs.github.io</h3>
<p>ApiVersion: v1</p>
<p>Kind: Pod</p>
<p>Name: kube-apiserver-vms100.liruilongs.github.io</p>
<p>Namespace: kube-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Secret/ETCD encryption enabled</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0066">C-0066</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.11 Ensure that the admission control plugin AlwaysPullImages is set</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0123">C-0123</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[5]</p> <p>spec.containers[0].command[5]=--enable-admission-plugins=NodeRestriction,AlwaysPullImages</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.19 Ensure that the API Server --audit-log-maxage argument is set to 30 or as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0131">C-0131</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--audit-log-maxage=30</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-3.2.1 Ensure that a minimal audit policy is created</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0160">C-0160</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.5 Ensure that the API Server --kubelet-certificate-authority argument is set as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0117">C-0117</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--kubelet-certificate-authority=&lt;path/to/ca.crt&gt;</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.29 Ensure that the API Server --encryption-provider-config argument is set as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0141">C-0141</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--encryption-provider-config=&lt;path/to/encryption-config.yaml&gt;</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.1 Ensure that the API Server --anonymous-auth argument is set to false</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0113">C-0113</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--anonymous-auth=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Audit logs enabled</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0067">C-0067</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.31 Ensure that the API Server only makes use of Strong Cryptographic Ciphers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0143">C-0143</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_RSA_WITH_3DES_EDE_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_GCM_SHA384</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-1.2.18 Ensure that the API Server --audit-log-path argument is set</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0130">C-0130</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--audit-log-path=/var/log/apiserver/audit.log</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.9 Ensure that the admission control plugin EventRateLimit is set</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0121">C-0121</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[5]</p> <p>spec.containers[0].command[5]=--enable-admission-plugins=NodeRestriction,EventRateLimit</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.20 Ensure that the API Server --audit-log-maxbackup argument is set to 10 or as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0132">C-0132</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]</p> <p>spec.containers[0].command[28]=--audit-log-maxbackup=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.12 Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0124">C-0124</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[5]</p> <p>spec.containers[0].command[5]=--enable-admission-plugins=NodeRestriction,SecurityContextDeny</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-1.2.21 Ensure that the API Server --audit-log-maxsize argument is set to 100 or as appropriate</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0133">C-0133</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]</p> <p>spec.containers[0].command[28]=--audit-log-maxsize=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">PSP enabled</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0068">C-0068</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[5]</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">CIS-1.2.17 Ensure that the API Server --profiling argument is set to false</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0129">C-0129</a></td>
<td class="resourceRemediationCell"> <p>spec.containers[0].command[28]=--profiling=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: default</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: default</p>
<p>Namespace: kubescape</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.5 Ensure that default service accounts are not actively used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0189">C-0189</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kubevuln-scheduler</h3>
<p>ApiVersion: batch/v1</p>
<p>Kind: CronJob</p>
<p>Name: kubevuln-scheduler</p>
<p>Namespace: kubescape</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Kubernetes CronJob</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0026">C-0026</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.securityContext.runAsNonRoot=true</p> <p>spec.jobTemplate.spec.template.spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: ks-sa</h3>
<p>ApiVersion: </p>
<p>Kind: ServiceAccount</p>
<p>Name: ks-sa</p>
<p>Namespace: kubescape</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Data Destruction</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0007">C-0007</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[1].resources[0]</p> <p>relatedObjects[1].rules[1].verbs[0]</p> <p>relatedObjects[1].rules[1].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> <p>relatedObjects[1].rules[2].resources[1]</p> <p>relatedObjects[1].rules[2].verbs[0]</p> <p>relatedObjects[1].rules[2].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">List Kubernetes secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0015">C-0015</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[0]</p> <p>relatedObjects[1].rules[0].verbs[1]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> <p>relatedObjects[1].rules[2].resources[1]</p> <p>relatedObjects[1].rules[2].verbs[0]</p> <p>relatedObjects[1].rules[2].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CoreDNS poisoning</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0037">C-0037</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[2].resources[0]</p> <p>relatedObjects[1].rules[2].verbs[0]</p> <p>relatedObjects[1].rules[2].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.2 Minimize access to secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0186">C-0186</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[0]</p> <p>relatedObjects[1].rules[0].verbs[1]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> <p>relatedObjects[1].rules[2].resources[1]</p> <p>relatedObjects[1].rules[2].verbs[0]</p> <p>relatedObjects[1].rules[2].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: kubescape-scheduler</h3>
<p>ApiVersion: batch/v1</p>
<p>Kind: CronJob</p>
<p>Name: kubescape-scheduler</p>
<p>Namespace: kubescape</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Kubernetes CronJob</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0026">C-0026</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.securityContext.runAsNonRoot=true</p> <p>spec.jobTemplate.spec.template.spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.jobTemplate.spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: local-path-provisioner</h3>
<p>ApiVersion: apps/v1</p>
<p>Kind: Deployment</p>
<p>Name: local-path-provisioner</p>
<p>Namespace: local-path-storage</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.securityContext.runAsNonRoot=true</p> <p>spec.template.spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: default</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: default</p>
<p>Namespace: local-path-storage</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.5 Ensure that default service accounts are not actively used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0189">C-0189</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: local-path-provisioner-service-account</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: local-path-provisioner-service-account</p>
<p>Namespace: local-path-storage</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: controller</h3>
<p>ApiVersion: </p>
<p>Kind: ServiceAccount</p>
<p>Name: controller</p>
<p>Namespace: metallb-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Data Destruction</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0007">C-0007</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[1]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">List Kubernetes secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0015">C-0015</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[2]</p> <p>relatedObjects[1].rules[0].verbs[3]</p> <p>relatedObjects[1].rules[0].verbs[6]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> <p>relatedObjects[1].rules[1].resources[0]</p> <p>relatedObjects[1].rules[1].verbs[0]</p> <p>relatedObjects[1].rules[1].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.2 Minimize access to secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0186">C-0186</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[0].resources[0]</p> <p>relatedObjects[1].rules[0].verbs[2]</p> <p>relatedObjects[1].rules[0].verbs[3]</p> <p>relatedObjects[1].rules[0].verbs[6]</p> <p>relatedObjects[1].rules[0].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> <p>relatedObjects[1].rules[1].resources[0]</p> <p>relatedObjects[1].rules[1].verbs[0]</p> <p>relatedObjects[1].rules[1].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Access container service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0053">C-0053</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: controller</h3>
<p>ApiVersion: apps/v1</p>
<p>Kind: Deployment</p>
<p>Name: controller</p>
<p>Namespace: metallb-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Applications credentials in configuration files</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0012">C-0012</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].env[0].name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: speaker</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: speaker</p>
<p>Namespace: metallb-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: speaker</h3>
<p>ApiVersion: apps/v1</p>
<p>Kind: DaemonSet</p>
<p>Name: speaker</p>
<p>Namespace: metallb-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.4.1 Prefer using secrets as files over secrets as environment variables</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0207">C-0207</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].env[4].name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.capabilities.add</p> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.securityContext.runAsNonRoot=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Container hostPort</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0044">C-0044</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].ports[0].hostPort</p> <p>spec.template.spec.containers[0].ports[1].hostPort</p> <p>spec.template.spec.containers[0].ports[2].hostPort</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Insecure capabilities</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0046">C-0046</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.capabilities.add[0]</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">HostNetwork access</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0041">C-0041</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.hostNetwork</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: controller</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: controller</p>
<p>Namespace: metallb-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: default</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: default</p>
<p>Namespace: metallb-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.5 Ensure that default service accounts are not actively used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0189">C-0189</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: speaker</h3>
<p>ApiVersion: </p>
<p>Kind: ServiceAccount</p>
<p>Name: speaker</p>
<p>Namespace: metallb-system</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">List Kubernetes secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0015">C-0015</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[1].resources[0]</p> <p>relatedObjects[1].rules[1].verbs[0]</p> <p>relatedObjects[1].rules[1].verbs[1]</p> <p>relatedObjects[1].rules[1].verbs[2]</p> <p>relatedObjects[1].rules[1].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.2 Minimize access to secrets</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0186">C-0186</a></td>
<td class="resourceRemediationCell"> <p>relatedObjects[1].rules[1].resources[0]</p> <p>relatedObjects[1].rules[1].verbs[0]</p> <p>relatedObjects[1].rules[1].verbs[1]</p> <p>relatedObjects[1].rules[1].verbs[2]</p> <p>relatedObjects[1].rules[1].apiGroups[0]</p> <p>relatedObjects[0].subjects[0]</p> <p>relatedObjects[0].roleRef.name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Access container service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0053">C-0053</a></td>
<td class="resourceRemediationCell"></td>
</tr>
</tbody>
</table>
</div>
<h3>Name: velero</h3>
<p>ApiVersion: apps/v1</p>
<p>Kind: Deployment</p>
<p>Name: velero</p>
<p>Namespace: velero</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Applications credentials in configuration files</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0012">C-0012</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].env[3].name</p> <p>spec.template.spec.containers[0].env[4].name</p> <p>spec.template.spec.containers[0].env[5].name</p> <p>spec.template.spec.containers[0].env[6].name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.securityContext.runAsNonRoot=true</p> <p>spec.template.spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: minio-setup</h3>
<p>ApiVersion: batch/v1</p>
<p>Kind: Job</p>
<p>Name: minio-setup</p>
<p>Namespace: velero</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Image pull policy on latest tag</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0075">C-0075</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> <p>spec.template.spec.containers[0].imagePullPolicy</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.securityContext.runAsNonRoot=true</p> <p>spec.template.spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: velero</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: velero</p>
<p>Namespace: velero</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: minio</h3>
<p>ApiVersion: apps/v1</p>
<p>Kind: Deployment</p>
<p>Name: minio</p>
<p>Namespace: velero</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Ingress and Egress blocked</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0030">C-0030</a></td>
<td class="resourceRemediationCell"></td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0210">C-0210</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile.type=RuntimeDefault</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Configured readiness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0018">C-0018</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].readinessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Configured liveness probe</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0056">C-0056</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].livenessProbe=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Image pull policy on latest tag</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0075">C-0075</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> <p>spec.template.spec.containers[0].imagePullPolicy</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Immutable container filesystem</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0017">C-0017</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources CPU limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0050">C-0050</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.cpu=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resources memory limit and request</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0004">C-0004</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.requests.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">CIS-5.7.3 Apply Security Context to Your Pods and Containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0211">C-0211</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true</p> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=NET_RAW</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Applications credentials in configuration files</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0012">C-0012</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].env[1].name</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Images from allowed registry</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0078">C-0078</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].image</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">K8s common labels usage</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0077">C-0077</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Allow privilege escalation</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0016">C-0016</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Low</td>
<td class="resourceNameCell">Label usage for resources</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0076">C-0076</a></td>
<td class="resourceRemediationCell"> <p>metadata.labels=YOUR_VALUE</p> <p>spec.template.metadata.labels=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Non-root containers</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0013">C-0013</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.runAsNonRoot=true</p> <p>spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">High</td>
<td class="resourceNameCell">Resource limits</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0009">C-0009</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE</p> <p>spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CVE-2022-0492-cgroups-container-escape</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0086">C-0086</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.securityContext.runAsNonRoot=true</p> <p>spec.template.spec.securityContext.allowPrivilegeEscalation=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Linux hardening</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0055">C-0055</a></td>
<td class="resourceRemediationCell"> <p>spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE</p> <p>spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE</p> </td>
</tr>
</tbody>
</table>
</div>
<h3>Name: default</h3>
<p>ApiVersion: v1</p>
<p>Kind: ServiceAccount</p>
<p>Name: default</p>
<p>Namespace: velero</p>
<table>
<thead>
<tr>
<th class="resourceSeverityCell">Severity</th>
<th class="resourceNameCell">Name</th>
<th class="resourceURLCell">Docs</th>
<th class="resourceRemediationCell">Assistant Remediation</th>
</tr>
</thead>
<tbody>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.6 Ensure that Service Account Tokens are only mounted where necessary</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0190">C-0190</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">Automatic mapping of service account</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0034">C-0034</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
<tr>
<td class="resourceSeverityCell">Medium</td>
<td class="resourceNameCell">CIS-5.1.5 Ensure that default service accounts are not actively used</td>
<td class="resourceURLCell"><a href="https://hub.armosec.io/docs/c-0189">C-0189</a></td>
<td class="resourceRemediationCell"> <p>automountServiceAccountToken=false</p> </td>
</tr>
</tbody>
</table>
</div>
</body>
</html>
马建仓 AI 助手
尝试更多
代码解读
代码找茬
代码优化
1
https://gitee.com/imajack/k8s_deploy_ansible.git
git@gitee.com:imajack/k8s_deploy_ansible.git
imajack
k8s_deploy_ansible
k8s 高可用集群 ansible 剧本部署
master

搜索帮助

0d507c66 1850385 C8b1a773 1850385