Control: CronJob containers should minimize its admission with capabilities assigned
Description
This check ensures that the container in the CronJob minimizes its admission with capabilities assigned.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.cronjob_container_capabilities_drop_allSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.cronjob_container_capabilities_drop_all --shareSQL
This control uses a named query:
select  distinct(coalesce(uid, concat(path, ':', start_line))) as resource,  case    when (c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["all"]')      or (c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["ALL"]') then 'ok'    else 'alarm'  end as status,  case    when (c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["all"]')      or (c -> 'securityContext' -> 'capabilities' -> 'drop' @> '["ALL"]') then c ->> 'name' || ' admission of containers with capabilities assigned minimized.'    else c ->> 'name' || ' admission of containers with capabilities assigned not minimized.'  end as reason,  name as cronjob_name    , coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as pathfrom  kubernetes_cronjob,  jsonb_array_elements(job_template -> 'spec' -> 'template' -> 'spec' -> 'containers') as c;