turbot/steampipe-mod-kubernetes-compliance

Control: Pod containers should has admission capability restricted

Description

This check ensures that the container in the Pod has admission capability restricted.

Usage

Run the control in your terminal:

powerpipe control run kubernetes_compliance.control.pod_container_admission_capability_restricted

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run kubernetes_compliance.control.pod_container_admission_capability_restricted --share

SQL

This control uses a named query:

select
coalesce(uid, concat(path, ':', start_line)) as resource,
case
when (c -> 'securityContext' -> 'capabilities' -> 'drop' is not null)
and (c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["all"]'
or c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["ALL"]'
or c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["NET_RAW"]') then 'ok'
else 'alarm'
end as status,
case
when (c -> 'securityContext' -> 'capabilities' -> 'drop' is not null)
and (c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["all"]'
or c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["ALL"]'
or c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["NET_RAW"]') then c ->> 'name' || ' admission capability is restricted.'
else c ->> 'name' || ' admission capability is not restricted.'
end as reason,
name as pod_name
, coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as path
from
kubernetes_pod,
jsonb_array_elements(containers) as c;

Tags