Control: Kubernetes cluster containers should run with a read only root file system
Description
Run containers with a read only root file system to protect from changes at run-time with malicious binaries being added to PATH in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.kubernetes_cluster_container_with_read_only_root_file_system
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.kubernetes_cluster_container_with_read_only_root_file_system --share
SQL
This control uses a named query:
manual_control