Control: Pods service account token shoulde be enabled
Description
This check ensures that Pod service account token is enabled.
Usage
Run the control in your terminal:
powerpipe control run kubernetes_compliance.control.pod_service_account_token_enabledSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run kubernetes_compliance.control.pod_service_account_token_enabled --shareSQL
This control uses a named query:
select  coalesce(uid, concat(path, ':', start_line)) as resource,  case    when ((annotations ->> 'kubectl.kubernetes.io/last-applied-configuration')::jsonb -> 'spec' ->> 'automountServiceAccountToken')::bool then 'ok'    else 'alarm'  end as status,  case    when ((annotations ->> 'kubectl.kubernetes.io/last-applied-configuration')::jsonb -> 'spec' ->> 'automountServiceAccountToken')::bool then 'name' || ' service account tokens enabled.'    else 'name' || ' service account tokens disabled.'  end as reason,  name as pod_name    , coalesce(context_name, '') as context_name, namespace, source_type, coalesce(path || ':' || start_line || '-' || end_line, '') as pathfrom  kubernetes_pod;