Control: PodTemplate containers should minimize its admission with capabilities assigned
Description
This check ensures that the container in the PodTemplate minimizes its admission with capabilities assigned.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.pod_template_container_capabilities_drop_all
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.pod_template_container_capabilities_drop_all --share
SQL
This control uses a named query:
select distinct(coalesce(uid, concat(path, ':', start_line))) as resource, case when (c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["all"]') or (c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["ALL"]') then 'ok' else 'alarm' end as status, case when (c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["all"]') or (c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["ALL"]') then c ->> 'name' || ' admission of containers with capabilities assigned minimized.' else c ->> 'name' || ' admission of containers with capabilities assigned not minimized.' end as reason, name as pod_template_name , coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as pathfrom kubernetes_pod_template, jsonb_array_elements(template -> 'spec' -> 'containers') as c;