Open ptx96 opened 3 years ago
@ptx96 can you run the test suite again excluding the Capsule Namespace and update the comment with the new results?
We can ignore the capsule-system
Namespace since our Operators has to act as cluster admin.
Added more tests to the issue description.
@ptx96 can you run the test suite again excluding the Capsule Namespace and update the comment with the new results?
In this way, only cluster-wide resources have been retrieved (probably out of scope).
We can ignore the
capsule-system
Namespace since our Operators has to act as cluster admin.
I don't think we should ignore capsule-system
namespace, because we'd lose focus on some interesting checks.
@maxgio92 could you please take care of this along with @ptx96 ?
I spinned up a new round of control of clusters and charts after kubescape and capsule has been updated to the most recent version.
We should discuss which elements need to be excluded from scrutiny as impossible to circumvent (risk acceptance);
furthermore, it would be useful to put these controls inside capsule github actions CI
@bsctl @prometherion WDYT?
Guys, let's consider to use also this tool from aquasec: https://github.com/aquasecurity/kube-bench
Guys, let's consider to use also this tool from aquasec: https://github.com/aquasecurity/kube-bench
Nice catch @alegrey91!
These controls, however, are very good when focused on kubernetes post-deployment hardening, while as regards kubernetes resources, kube-bench will only show manual check that the operator should perform as described in the policy config (among other things still stopped at kubernetes v1.20 with PSP)
Anyway, we should consider it during paas steps.
Background
The Kubernetes Hardening Guidance by NSA and CISA details recommendations to harden Kubernetes systems;
while some security measures depend on the target cluster and its architecture, others are closely related to containers and Pods, due to possible vulnerabilities, misconfiguration, and wrong privileges.
Proposal
To speed up the recognition and fix of possible breaches, we could test the armosec/kubescape utility against the namespace of a freshly installed capsule;
then, consider which actions to take and which to exclude as out of scope/unrepairable.
Tests Output
Cluster scan:
Namespaces:
capsule-cluster-nsa-2021-10-29.log capsule-cluster-mitre-2021-10-29.log
Preview
NSA
Resources affected:
MITRE
Resources affected:
HELM Charts scan:
capsule-helm-nsa-2021-10-29.log capsule-helm-mitre-2021-10-29.log
Test parameters