turbot/steampipe-mod-kubernetes-compliance

Control: Pods service account token shoulde be enabled

Description

This check ensures that Pod service account token is enabled.

Usage

Run the control in your terminal:

powerpipe control run kubernetes_compliance.control.pod_service_account_token_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run kubernetes_compliance.control.pod_service_account_token_enabled --share

SQL

This control uses a named query:

select
coalesce(uid, concat(path, ':', start_line)) as resource,
case
when ((annotations ->> 'kubectl.kubernetes.io/last-applied-configuration')::jsonb -> 'spec' ->> 'automountServiceAccountToken')::bool then 'ok'
else 'alarm'
end as status,
case
when ((annotations ->> 'kubectl.kubernetes.io/last-applied-configuration')::jsonb -> 'spec' ->> 'automountServiceAccountToken')::bool then 'name' || ' service account tokens enabled.'
else 'name' || ' service account tokens disabled.'
end as reason,
name as pod_name
, coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as path
from
kubernetes_pod;

Tags