Control: Job containers should not run with host network access
Description
Containers in a Job should not run in the host network of the node where the pod is deployed. When running on the host network, the pod can use the network namespace and network resources of the node. In this case, the pod can access loopback devices, listen to addresses, and monitor the traffic of other pods on the node.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.job_host_network_access_disabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.job_host_network_access_disabled --share
SQL
This control uses a named query:
job_host_network_access_disabled