turbot/steampipe-mod-kubernetes-compliance

Control: CronJob containers kubelet should only make use of strong cryptographic ciphers

Description

This check ensures that the container in the CronJob has kubelet using strong cryptographic ciphers.

Usage

Run the control in your terminal:

powerpipe control run kubernetes_compliance.control.cronjob_container_strong_kubelet_cryptographic_ciphers

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run kubernetes_compliance.control.cronjob_container_strong_kubelet_cryptographic_ciphers --share

SQL

This control uses a named query:

with container_list as (
select
c ->> 'name' as container_name,
trim('"' from split_part(co::text, '=', 2)) as value,
j.name as cronjob
from
kubernetes_cronjob as j,
jsonb_array_elements(job_template -> 'spec' -> 'template' -> 'spec' -> 'containers') as c,
jsonb_array_elements_text(c -> 'command') as co
where
co like '%--tls-cipher-suites=%'
), container_name_with_cronjob_name as (
select
j.name as cronjob_name,
j.uid as cronjob_uid,
j.path as path,
j.start_line as start_line,
j.end_line as end_line,
j.context_name as context_name,
j.namespace as namespace,
j.source_type as source_type,
j.tags as tags,
j._ctx as _ctx,
c.*
from
kubernetes_cronjob as j,
jsonb_array_elements(job_template -> 'spec' -> 'template' -> 'spec' -> 'containers') as c
)
select
coalesce(j.cronjob_uid, concat(j.path, ':', j.start_line)) as resource,
case
when (j.value -> 'command') is null or not ((j.value -> 'command') @> '["kubelet"]') then 'ok'
when l.container_name is not null and (j.value -> 'command') @> '["kubelet"]'
and string_to_array(l.value, ',') <@ array['TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305','TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384','TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305','TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384','TLS_RSA_WITH_AES_256_GCM_SHA384','TLS_RSA_WITH_AES_128_GCM_SHA256']
then 'ok'
else 'alarm'
end as status,
case
when (j.value -> 'command') is null then j.value ->> 'name' || ' command not defined.'
when not ((j.value -> 'command') @> '["kubelet"]') then j.value ->> 'name' || ' kubelet not defined.'
when l.container_name is not null and (j.value -> 'command') @> '["kubelet"]'
and string_to_array(l.value, ',') <@ array['TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305','TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384','TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305','TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384','TLS_RSA_WITH_AES_256_GCM_SHA384','TLS_RSA_WITH_AES_128_GCM_SHA256']
then j.value ->> 'name' || ' kubelet uses strong cryptographic ciphers.'
else j.value ->> 'name' || ' kubelet not using strong cryptographic ciphers.'
end as reason,
j.cronjob_name as cronjob_name
, coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as path
from
container_name_with_cronjob_name as j
left join container_list as l on j.value ->> 'name' = l.container_name and j.cronjob_name = l.cronjob;

Tags