Control: GKE clusters nodes should not use default service account
Description
This control ensures that GKE clusters nodes does not uses default service account. It is recommended to create and use a least privileged service account to run your GKE cluster instead of using the default service account.
Usage
Run the control in your terminal:
powerpipe control run gcp_compliance.control.kubernetes_cluster_node_no_default_service_account
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run gcp_compliance.control.kubernetes_cluster_node_no_default_service_account --share
SQL
This control uses a named query:
kubernetes_cluster_node_no_default_service_account