Control: CronJob containers kubelet should only make use of strong cryptographic ciphers
Description
This check ensures that the container in the CronJob has kubelet using strong cryptographic ciphers.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.cronjob_container_strong_kubelet_cryptographic_ciphers
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.cronjob_container_strong_kubelet_cryptographic_ciphers --share
SQL
This control uses a named query:
with container_list as ( select c ->> 'name' as container_name, trim('"' from split_part(co::text, '=', 2)) as value, j.name as cronjob from kubernetes_cronjob as j, jsonb_array_elements(job_template -> 'spec' -> 'template' -> 'spec' -> 'containers') as c, jsonb_array_elements_text(c -> 'command') as co where co like '%--tls-cipher-suites=%'), container_name_with_cronjob_name as ( select j.name as cronjob_name, j.uid as cronjob_uid, j.path as path, j.start_line as start_line, j.end_line as end_line, j.context_name as context_name, j.namespace as namespace, j.source_type as source_type, j.tags as tags, j._ctx as _ctx, c.* from kubernetes_cronjob as j, jsonb_array_elements(job_template -> 'spec' -> 'template' -> 'spec' -> 'containers') as c)select coalesce(j.cronjob_uid, concat(j.path, ':', j.start_line)) as resource, case when (j.value -> 'command') is null or not ((j.value -> 'command') @> '["kubelet"]') then 'ok' when l.container_name is not null and (j.value -> 'command') @> '["kubelet"]' and string_to_array(l.value, ',') <@ array['TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305','TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384','TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305','TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384','TLS_RSA_WITH_AES_256_GCM_SHA384','TLS_RSA_WITH_AES_128_GCM_SHA256'] then 'ok' else 'alarm' end as status, case when (j.value -> 'command') is null then j.value ->> 'name' || ' command not defined.' when not ((j.value -> 'command') @> '["kubelet"]') then j.value ->> 'name' || ' kubelet not defined.' when l.container_name is not null and (j.value -> 'command') @> '["kubelet"]' and string_to_array(l.value, ',') <@ array['TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305','TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384','TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305','TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384','TLS_RSA_WITH_AES_256_GCM_SHA384','TLS_RSA_WITH_AES_128_GCM_SHA256'] then j.value ->> 'name' || ' kubelet uses strong cryptographic ciphers.' else j.value ->> 'name' || ' kubelet not using strong cryptographic ciphers.' end as reason, j.cronjob_name as cronjob_name , coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as pathfrom container_name_with_cronjob_name as j left join container_list as l on j.value ->> 'name' = l.container_name and j.cronjob_name = l.cronjob;