Control: Pod Security Policy should prohibit host network access
Description
Pod Security Policy host network controls whether the Pod may use the node network namespace. Doing so gives the Pod access to the loopback device, services listening on localhost, and could be used to snoop on network activity of other Pods on the same node.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.pod_security_policy_host_network_access_disabled
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.pod_security_policy_host_network_access_disabled --share
SQL
This control uses a named query:
select coalesce(uid, concat(path, ':', start_line)) as resource, case when host_network then 'alarm' else 'ok' end as status, case when host_network then 'Pod security policy ' || name || ' pods can use the host network.' else 'Pod security policy ' || name || ' pods cannot use the host network.' end as reason , coalesce(context_name, '') as context_name, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as pathfrom kubernetes_pod_security_policy;