turbot/steampipe-mod-kubernetes-compliance

Control: CronJob containers should not have added capabilities

Description

Container in CronJob definition should not have added capabilities. Added capabilities can provide container processes with escalated privileges which can be used to access sensitive host resources or perform operations outside of the container.

Usage

Run the control in your terminal:

powerpipe control run kubernetes_compliance.control.cronjob_container_with_added_capabilities

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run kubernetes_compliance.control.cronjob_container_with_added_capabilities --share

SQL

This control uses a named query:

select
coalesce(uid, concat(path, ':', start_line)) as resource,
case
when c -> 'securityContext' -> 'capabilities' -> 'add' is null then 'ok'
else 'alarm'
end as status,
case
when c -> 'securityContext' -> 'capabilities' -> 'add' is null then c ->> 'name' || ' without added capability.'
else c ->> 'name' || ' with added capability.'
end as reason,
name as cronjob_name
, coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as path
from
kubernetes_cronjob,
jsonb_array_elements(job_template -> 'spec' -> 'template' -> 'spec' -> 'containers') as c;

Tags