Benchmark: Pod
Description
This section contains recommendations for configuring Pod resources.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-kubernetes-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select Pod.
Run this benchmark in your terminal:
powerpipe benchmark run kubernetes_compliance.benchmark.all_controls_pod
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run kubernetes_compliance.benchmark.all_controls_pod --share
Controls
- Pod containers should has admission capability restricted
- Pod containers admission control plugin should be set to 'always pull images'
- Pod containers admission control plugin should not be set to 'always admit'
- Pod containers peer client cert auth should be enabled
- Pod containers argument anonymous auth should be disabled
- Pod containers should have audit log max-age set to 30 or greater
- Pod containers should have audit log max backup set to 10 or greater
- Pod containers should have audit log max size set to 100 or greater
- Pod containers should have audit log path configured appropriately
- Pod containers argument authorization mode should not be set to 'always allow'
- Pod containers argument authorization mode should have node
- Pod containers argument authorization mode should have RBAC
- Pod containers argument etcd auto TLS should be disabled
- Pod containers argument etcd cafile should be set
- Pod containers should have etcd certfile and keyfile configured appropriately
- Pod containers argument etcd client cert auth should be enabled
- Pod containers should have etcd peer certfile and peer keyfile configured appropriately
- Pod containers argument event qps should be less than 5
- Pod containers argument insecure port should be set to 0
- Pod containers argument apiserver etcd certfile and keyfile should be configured
- Pod containers kube-apiserver profiling should be disabled
- Pod containers should have kube-apiserver TLS cert file and TLS private key file configured appropriately
- Pod containers argument kube-controller-manager bind address should be set to 127.0.0.1
- Pod containers kube controller manager profiling should be disabled
- Pod containers should have kube controller manager root CA file configured appropriately
- Pod containers argument kube controller manager service account credentials should be enabled
- Pod containers should have kube controller manager service account private key file configured appropriately
- Pod containers argument kube-scheduler bind address should be set to 127.0.0.1
- Pod containers kube scheduler profiling should be disabled
- Pod containers argument kubelet authorization mode should not be set to 'always allow'
- Pod containers should have kubelet client CA file configured appropriately
- Pod containers argument kubelet client certificate and key should be configured
- Pod containers argument kubelet HTTPS should be enabled
- Pod containers argument kubelet read-only port should be set to 0
- Pod containers should have kubelet terminated pod gc threshold configured appropriately
- Pod containers should have kubelet TLS cert file and TLS private key file configured appropriately
- Pod containers argument make iptables util chains should be enabled
- Pod containers argument admission control plugin NamespaceLifecycle should be enabled
- Pod containers argument admission control plugin NodeRestriction should be enabled
- Pod containers argument admission control plugin PodSecurityPolicy should be enabled
- Pod containers argument protect kernel defaults should be enabled
- Pod containers argument request timeout should be set as appropriate
- Pod containers argument rotate kubelet server certificate should be enabled
- Pod containers argument secure port should not be set to 0
- Pod containers argument admission control plugin where either PodSecurityPolicy or SecurityContextDeny should be enabled
- Pod containers argument admission control plugin ServiceAccount should be enabled
- Pod containers --service-account-key-file argument should be set as appropriate
- Pod containers argument service account lookup should be enabled
- Pod containers should minimize its admission with capabilities assigned
- Pod containers should has encryption providers configured appropriately
- Pod containers ports should not have host port specified
- Pod containers has image pull policy set to Always
- Pod containers have image tag specified which should be fixed not latest or blank
- Pod containers should have kubelet certificate authority configured appropriately
- Pod containers Kubernetes dashboard should not be deployed
- Pod containers should have liveness probe
- Pod containers should have a memory limit
- Pod containers should have a memory request
- Pod containers argument basic auth file should not be set
- Pod containers argument hostname override should not be configured
- Pod containers argument insecure bind address should not be set
- Pod containers should not have privileged access
- Pod containers should not allow privilege escalation
- Pod containers should not be mapped with privilege ports
- Pod containers should have readiness probe
- Pod containers certificate rotation should be enabled
- Pods containers run as user should be set to 10000 or greater
- Pod containers secrets should be defined as files
- Pod containers should have security context
- Pod containers argument --streaming-connection-idle-timeout should not be set to 0
- Pod containers kube-apiserver should only make use of strong cryptographic ciphers
- Pod containers kubelet should only make use of strong cryptographic ciphers
- Pod containers should not use CAP_SYS_ADMIN linux capability
- Pod containers token auth file should not be configured
- Pod containers should minimize the admission of containers with added capability
- Pods should not use default namespace
- Seccomp profile is set to docker/default in your Pods
- Pod containers should not run with host network access
- Pod containers should not share the host process namespace
- Pod containers should run with a read only root file system
- Pod containers should not run with root privileges
- Pods should not refer to a non existing service account
- Automatic mapping of the service account tokens should be disabled in Pod
- Pods service account token shoulde be enabled
- Pod containers should not allow privilege escalation