Control: Pod containers should not allow privilege escalation
Description
Containers in a Pod should not able to access any specific paths of the host file system. There are many ways a container with unrestricted access to the host filesystem can escalate privileges, including reading data from other containers, and abusing the credentials of system services, such as Kubelet.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.pod_volume_host_path
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.pod_volume_host_path --share
SQL
This control uses a named query:
pod_volume_host_path