Control: Pod Security Policy should prohibit host network access
Description
Pod Security Policy host network controls whether the Pod may use the node network namespace. Doing so gives the Pod access to the loopback device, services listening on localhost, and could be used to snoop on network activity of other Pods on the same node.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.pod_security_policy_host_network_access_disabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.pod_security_policy_host_network_access_disabled --shareSQL
This control uses a named query:
select coalesce(uid, concat(path, ':', start_line)) as resource, case when host_network then 'alarm' else 'ok' end as status, case when host_network then 'Pod security policy ' || name || ' pods can use the host network.' else 'Pod security policy ' || name || ' pods cannot use the host network.' end as reason , coalesce(context_name, '') as context_name, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as pathfrom kubernetes_pod_security_policy;