turbot/kubernetes_compliance

Control: Pod containers should not allow privilege escalation

Description

Containers in a Pod should not able to access any specific paths of the host file system. There are many ways a container with unrestricted access to the host filesystem can escalate privileges, including reading data from other containers, and abusing the credentials of system services, such as Kubelet.

Usage

Run the control in your terminal:

powerpipe control run kubernetes_compliance.control.pod_volume_host_path

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run kubernetes_compliance.control.pod_volume_host_path --share

SQL

This control uses a named query:

pod_volume_host_path

Tags