When scanning a YAML file (Helm chart template), using terrascan, I always get the AC_K8S_0080-secCompProfile violated policy. I tried to define the SecComp profile as an annotation in both the resource metadata and template, and in both the resource and container's securityContext, but still get the violation.
Violation Details -
Description : Default seccomp profile not enabled will make the container to make non-essential system calls
File : chart_template.yaml
Line : 151
Severity : MEDIUM
-----------------------------------------------------------------------
Scan Summary -
File/Folder : chart_template.yaml
IaC Type : k8s
Scanned At : 2023-07-05 10:23:39.193272 +0000 UTC
Policies Validated : 42
Violated Policies : 1
Low : 0
Medium : 1
High : 0
How can I define the seccomp profile for a resource so that the violation disappears? Thank you.
Hello,
Description
When scanning a YAML file (Helm chart template), using terrascan, I always get the AC_K8S_0080-secCompProfile violated policy. I tried to define the SecComp profile as an annotation in both the resource metadata and template, and in both the resource and container's securityContext, but still get the violation.
What I Did
Terrascan version:
YAML file:
Terrascan command:
Terrascan output:
How can I define the seccomp profile for a resource so that the violation disappears? Thank you.