turbot/kubernetes_compliance

Control: Job containers should not run with host network access

Description

Containers in a Job should not run in the host network of the node where the pod is deployed. When running on the host network, the pod can use the network namespace and network resources of the node. In this case, the pod can access loopback devices, listen to addresses, and monitor the traffic of other pods on the node.

Usage

Run the control in your terminal:

powerpipe control run kubernetes_compliance.control.job_host_network_access_disabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run kubernetes_compliance.control.job_host_network_access_disabled --share

SQL

This control uses a named query:

job_host_network_access_disabled

Tags