Cluster Overview: https://10.0.0.1:443
Score is the percentage of passing checks. Warnings get half the weight of dangerous checks.
-
1654 passing checks
-
900 warning checks
-
203 dangerous checks
Results by Category
Configuring resource requests and limits for workloads running in Kubernetes helps ensure that every container will have access to all the resources it needs. These are also a crucial part of cluster autoscaling logic, as new nodes are only spun up when there is insufficient capacity on existing infrastructure for new pod(s). By default, Polaris validates that resource requests and limits are set, it also includes optional functionality to ensure these requests and limits fall within specified ranges. Refer to the Polaris documentation about Efficiency for more information.
Kubernetes is built to reliabily run highly available applications. Polaris includes a number of checks to ensure that you are maximizing the reliability potential of Kubernetes. Refer to the Polaris documentation about Reliability for more information.
Kubernetes provides a great deal of configurability when it comes to the security of your workloads. A key principle here involves limiting the level of access any individual workload has. Polaris has validations for a number of best practices, mostly focused on ensuring that unnecessary access has not been granted to an application workload. Refer to the Polaris documentation about Security for more information.
Cluster Resources
Namespace: adminconsole
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container ui:
- The container sets potentially sensitive environment variables
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- CPU requests should be set
- Container should not have insecure capabilities
- Memory requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- Host port is not configured
- Image tag is specified
- Not running as privileged
- Liveness probe is configured
- Readiness probe is configured
- Container does not have any dangerous capabilities
Spec: no checks applied
Spec: no checks applied
Namespace: aks-command
Namespace: argocd
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container argocd-applicationset-controller:
- CPU requests should be set
- Memory requests should be set
- Liveness probe should be configured
- Readiness probe should be configured
- Host port is not configured
- Image pull policy is "Always"
- Is not allowed to run as root
- Image tag is specified
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Privilege escalation not allowed
- Not running as privileged
- Container does not have any dangerous capabilities
- Container does not have any insecure capabilities
- Filesystem is read only
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container copyutil:
- Host port is not configured
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Privilege escalation not allowed
- Image pull policy is "Always"
- Image tag is specified
- Container does not have any dangerous capabilities
- Filesystem is read only
- Not running as privileged
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
Container dex:
- Liveness probe should be configured
- Memory requests should be set
- Readiness probe should be configured
- CPU requests should be set
- Image pull policy is "Always"
- Not running as privileged
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Privilege escalation not allowed
- Host port is not configured
- Container does not have any insecure capabilities
- Filesystem is read only
- Image tag is specified
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host network is not configured
- Host PID is not configured
- Host IPC is not configured
Container argocd-notifications-controller:
- CPU requests should be set
- Memory requests should be set
- Readiness probe should be configured
- Liveness probe is configured
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Filesystem is read only
- Image pull policy is "Always"
- Is not allowed to run as root
- Container does not have any insecure capabilities
- Privilege escalation not allowed
- Image tag is specified
- Container does not have any dangerous capabilities
- Not running as privileged
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
Container redis:
- Liveness probe should be configured
- Memory requests should be set
- Readiness probe should be configured
- Filesystem should be read only
- CPU requests should be set
- Image pull policy is "Always"
- The container does not set potentially sensitive environment variables
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Not running as privileged
- Is not allowed to run as root
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- Privilege escalation not allowed
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host PID is not configured
- The ServiceAccount will not be automounted
- Host IPC is not configured
- Host network is not configured
Container copyutil:
- Image pull policy should be "Always"
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Container does not have any dangerous capabilities
- Container does not have any insecure capabilities
- Privilege escalation not allowed
- Is not allowed to run as root
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Filesystem is read only
Container argocd-repo-server:
- Memory requests should be set
- CPU requests should be set
- Filesystem is read only
- Image pull policy is "Always"
- Image tag is specified
- Liveness probe is configured
- Privilege escalation not allowed
- Readiness probe is configured
- Host port is not configured
- Container does not have any insecure capabilities
- Not running as privileged
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container argocd-server:
- CPU requests should be set
- Memory requests should be set
- Filesystem is read only
- Container does not have any insecure capabilities
- Image pull policy is "Always"
- Not running as privileged
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Liveness probe is configured
- Privilege escalation not allowed
- Readiness probe is configured
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec:
- The RoleBinding does not reference a Role allowing Pod exec or attach
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference a Role allowing Pod exec or attach
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
Spec:
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding references a Role that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container argocd-application-controller:
- Liveness probe should be configured
- Memory requests should be set
- CPU requests should be set
- Container does not have any dangerous capabilities
- The container does not set potentially sensitive environment variables
- Is not allowed to run as root
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Filesystem is read only
- Image pull policy is "Always"
- Readiness probe is configured
- Privilege escalation not allowed
- Image tag is specified
- Container does not have any insecure capabilities
- Not running as privileged
Namespace: azure-agent
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container dotgov-test-agent:
- Privilege escalation should not be allowed
- Image tag should be specified
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Readiness probe should be configured
- Should not be allowed to run as root
- CPU requests should be set
- Liveness probe should be configured
- Memory requests should be set
- Filesystem should be read only
- Image pull policy is "Always"
- Host port is not configured
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
Spec: no checks applied
Namespace: cert-manager
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container cert-manager-controller:
- CPU requests should be set
- Memory requests should be set
- Image pull policy should be "Always"
- Readiness probe should be configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Container does not have any dangerous capabilities
- Container does not have any insecure capabilities
- Liveness probe is configured
- Filesystem is read only
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Host port is not configured
- Privilege escalation not allowed
- Not running as privileged
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container cert-manager-cainjector:
- Liveness probe should be configured
- Image pull policy should be "Always"
- Readiness probe should be configured
- CPU requests should be set
- Memory requests should be set
- Container does not have any insecure capabilities
- Filesystem is read only
- Not running as privileged
- Privilege escalation not allowed
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Is not allowed to run as root
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container cert-manager-webhook:
- CPU requests should be set
- Memory requests should be set
- Image pull policy should be "Always"
- Container does not have any insecure capabilities
- Liveness probe is configured
- Readiness probe is configured
- Is not allowed to run as root
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Privilege escalation not allowed
- Host port is not configured
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Container does not have any dangerous capabilities
- Filesystem is read only
- Not running as privileged
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: cloudadmin
Spec:
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Namespace: default
Namespace: dge
Namespace: dotgovadmin
Namespace: dotgovdocs
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host network is not configured
- Host PID is not configured
- Host IPC is not configured
Container api:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- CPU requests should be set
- Filesystem should be read only
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Memory requests should be set
- Should not be allowed to run as root
- Container does not have any dangerous capabilities
- Host port is not configured
- Liveness probe is configured
- Readiness probe is configured
- Image tag is specified
- Not running as privileged
- The container does not set potentially sensitive environment variables
Spec:
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: dotgovengine
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will not be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container dotgovengine-api:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Filesystem should be read only
- Readiness probe should be configured
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Should not be allowed to run as root
- The container does not set potentially sensitive environment variables
- CPU requests are set
- Host port is not configured
- Not running as privileged
- Container does not have any dangerous capabilities
- Memory requests are set
- Liveness probe is configured
- Image tag is specified
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
- The ServiceAccount will not be automounted
Container dotgovengine-ui:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Should not be allowed to run as root
- Filesystem should be read only
- Container should not have insecure capabilities
- Liveness probe should be configured
- Image pull policy should be "Always"
- Readiness probe should be configured
- Memory requests are set
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- Not running as privileged
- The container does not set potentially sensitive environment variables
- CPU requests are set
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will not be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container dotgovengine-web:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Filesystem should be read only
- Image pull policy should be "Always"
- Readiness probe should be configured
- Host port is not configured
- The container does not set potentially sensitive environment variables
- Liveness probe is configured
- Memory requests are set
- CPU requests are set
- Image tag is specified
- Container does not have any dangerous capabilities
- Not running as privileged
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will not be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container dotgovengine-api:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Should not be allowed to run as root
- Image pull policy should be "Always"
- Filesystem should be read only
- Readiness probe should be configured
- Container does not have any dangerous capabilities
- Not running as privileged
- The container does not set potentially sensitive environment variables
- CPU requests are set
- Host port is not configured
- Memory requests are set
- Liveness probe is configured
- Image tag is specified
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host network is not configured
- Host PID is not configured
- The ServiceAccount will not be automounted
- Host IPC is not configured
Container dotgovengine-ui:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Container should not have insecure capabilities
- Liveness probe should be configured
- Image pull policy should be "Always"
- Filesystem should be read only
- Should not be allowed to run as root
- Readiness probe should be configured
- Container does not have any dangerous capabilities
- Memory requests are set
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Not running as privileged
- CPU requests are set
- Host port is not configured
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will not be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container dotgovengine-web:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Filesystem should be read only
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Readiness probe should be configured
- Should not be allowed to run as root
- Container does not have any dangerous capabilities
- Memory requests are set
- Not running as privileged
- Image tag is specified
- CPU requests are set
- Host port is not configured
- The container does not set potentially sensitive environment variables
- Liveness probe is configured
Spec:
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: dotgovframework
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container workspace-webasm:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Filesystem should be read only
- Container does not have any dangerous capabilities
- Privilege escalation not allowed
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Host port is not configured
- Not running as privileged
- Image tag is specified
Container workspace-zims:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Filesystem should be read only
- Image pull policy should be "Always"
- Host port is not configured
- Privilege escalation not allowed
- Not running as privileged
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Image tag is specified
Container workspace-applibs:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Filesystem should be read only
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Container does not have any dangerous capabilities
- Privilege escalation not allowed
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Host port is not configured
- Not running as privileged
Container backofficeapi:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Should not be allowed to run as root
- Filesystem should be read only
- The container does not set potentially sensitive environment variables
- Memory requests are set
- Image tag is specified
- CPU requests are set
- Container does not have any dangerous capabilities
- Host port is not configured
- Liveness probe is configured
- Readiness probe is configured
- Not running as privileged
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container backofficeui:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Filesystem should be read only
- CPU requests are set
- Host port is not configured
- Memory requests are set
- Container does not have any dangerous capabilities
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
- Readiness probe is configured
- Not running as privileged
- Image tag is specified
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container workspace-webasm:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Filesystem should be read only
- Container does not have any dangerous capabilities
- Not running as privileged
- Image tag is specified
- Host port is not configured
- Privilege escalation not allowed
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
Container workspace-zims:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Filesystem should be read only
- Image pull policy should be "Always"
- Privilege escalation not allowed
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Not running as privileged
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
Container workspace-applibs:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Filesystem should be read only
- Image pull policy should be "Always"
- Host port is not configured
- Image tag is specified
- Container does not have any dangerous capabilities
- Privilege escalation not allowed
- Not running as privileged
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
Container frontofficeapi:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Should not be allowed to run as root
- Filesystem should be read only
- Image pull policy should be "Always"
- CPU requests are set
- Container does not have any dangerous capabilities
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
- Not running as privileged
- Image tag is specified
- Host port is not configured
- Readiness probe is configured
- Memory requests are set
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host network is not configured
- Host PID is not configured
- Host IPC is not configured
Container frontofficeui:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Container should not have insecure capabilities
- Should not be allowed to run as root
- Filesystem should be read only
- Image pull policy should be "Always"
- Readiness probe is configured
- Container does not have any dangerous capabilities
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Host port is not configured
- Liveness probe is configured
- Image tag is specified
- CPU requests are set
- Memory requests are set
Spec:
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: dotgovmobileid
Namespace: dotgovnotify
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container admin:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- The container sets potentially sensitive environment variables
- Should not be allowed to run as root
- Memory requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- CPU requests should be set
- Liveness probe is configured
- Not running as privileged
- Image tag is specified
- Container does not have any dangerous capabilities
- Readiness probe is configured
- Host port is not configured
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container api:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- The container sets potentially sensitive environment variables
- Privilege escalation should not be allowed
- CPU requests should be set
- Memory requests should be set
- Filesystem should be read only
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- Readiness probe is configured
- Liveness probe is configured
- Not running as privileged
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container firebase:
- Privilege escalation should not be allowed
- Image tag should be specified
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Filesystem should be read only
- Image pull policy should be "Always"
- CPU requests should be set
- Container should not have insecure capabilities
- Memory requests should be set
- Should not be allowed to run as root
- Liveness probe is configured
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Host port is not configured
- Not running as privileged
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container jobservice:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Image tag should be specified
- CPU requests should be set
- Memory requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Host port is not configured
- The container does not set potentially sensitive environment variables
- Not running as privileged
- Container does not have any dangerous capabilities
- Readiness probe is configured
- Liveness probe is configured
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container otp:
- The container sets potentially sensitive environment variables
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Filesystem should be read only
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Memory requests should be set
- CPU requests should be set
- Container should not have insecure capabilities
- Readiness probe is configured
- Not running as privileged
- Container does not have any dangerous capabilities
- Image tag is specified
- Host port is not configured
- Liveness probe is configured
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container preferences:
- Privilege escalation should not be allowed
- The container sets potentially sensitive environment variables
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- Should not be allowed to run as root
- CPU requests should be set
- Container should not have insecure capabilities
- Liveness probe is configured
- Not running as privileged
- Container does not have any dangerous capabilities
- Host port is not configured
- Readiness probe is configured
- Image tag is specified
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container sendgrid:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Container should not have insecure capabilities
- Memory requests should be set
- Image pull policy should be "Always"
- Filesystem should be read only
- Should not be allowed to run as root
- CPU requests should be set
- Container does not have any dangerous capabilities
- Image tag is specified
- Liveness probe is configured
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- Host port is not configured
- Not running as privileged
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container telegram:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- CPU requests should be set
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Memory requests should be set
- Filesystem should be read only
- Liveness probe is configured
- Readiness probe is configured
- Not running as privileged
- Host port is not configured
- Image tag is specified
- Container does not have any dangerous capabilities
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container templates:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- The container sets potentially sensitive environment variables
- Privilege escalation should not be allowed
- Filesystem should be read only
- Should not be allowed to run as root
- CPU requests should be set
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Memory requests should be set
- Liveness probe is configured
- Readiness probe is configured
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- Not running as privileged
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container twiliosms:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Image tag should be specified
- CPU requests should be set
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Memory requests should be set
- Filesystem should be read only
- Host port is not configured
- Container does not have any dangerous capabilities
- Liveness probe is configured
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Readiness probe is configured
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host network is not configured
- Host PID is not configured
- Host IPC is not configured
Container twiliowhatsapp:
- Image tag should be specified
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Should not be allowed to run as root
- Filesystem should be read only
- Container should not have insecure capabilities
- Memory requests should be set
- Image pull policy should be "Always"
- CPU requests should be set
- Container does not have any dangerous capabilities
- The container does not set potentially sensitive environment variables
- Readiness probe is configured
- Not running as privileged
- Host port is not configured
- Liveness probe is configured
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host PID is not configured
- Host IPC is not configured
- Host network is not configured
Container zamtel:
- Privilege escalation should not be allowed
- Image tag should be specified
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Container should not have insecure capabilities
- CPU requests should be set
- Readiness probe is configured
- Not running as privileged
- Host port is not configured
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
Spec:
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: dotgovpass
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container admin:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- The container sets potentially sensitive environment variables
- Image pull policy should be "Always"
- CPU requests should be set
- Memory requests should be set
- Filesystem should be read only
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Container does not have any dangerous capabilities
- Readiness probe is configured
- Not running as privileged
- Host port is not configured
- Image tag is specified
- Liveness probe is configured
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container api:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Filesystem should be read only
- Container should not have insecure capabilities
- CPU requests should be set
- Memory requests should be set
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Not running as privileged
- Container does not have any dangerous capabilities
- Host port is not configured
- Liveness probe is configured
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container claims:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Container should not have insecure capabilities
- Filesystem should be read only
- Should not be allowed to run as root
- Image pull policy should be "Always"
- CPU requests should be set
- Memory requests should be set
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Liveness probe is configured
- Image tag is specified
- Host port is not configured
- Readiness probe is configured
- Not running as privileged
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container ui:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Image pull policy should be "Always"
- CPU requests should be set
- Container should not have insecure capabilities
- Should not be allowed to run as root
- Filesystem should be read only
- Memory requests should be set
- Container does not have any dangerous capabilities
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Liveness probe is configured
- Host port is not configured
- Readiness probe is configured
- Image tag is specified
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container hydra:
- Memory requests should be set
- Image pull policy should be "Always"
- CPU requests should be set
- Liveness probe should be configured
- Host port is not configured
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Filesystem is read only
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Privilege escalation not allowed
- Readiness probe is configured
- Is not allowed to run as root
- Container does not have any dangerous capabilities
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container hydra-maester:
- Readiness probe should be configured
- Liveness probe should be configured
- CPU requests should be set
- Memory requests should be set
- Image pull policy should be "Always"
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Host port is not configured
- Filesystem is read only
- Privilege escalation not allowed
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Is not allowed to run as root
- Container does not have any dangerous capabilities
- Container does not have any insecure capabilities
- Not running as privileged
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container dotgovpasskratos:
- Memory requests should be set
- Image pull policy should be "Always"
- CPU requests should be set
- Container does not have any dangerous capabilities
- Privilege escalation not allowed
- Readiness probe is configured
- Image tag is specified
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Liveness probe is configured
- Filesystem is read only
- Not running as privileged
- Is not allowed to run as root
- Container does not have any insecure capabilities
- The container does not set potentially sensitive environment variables
Pod Spec:
Container hydra-automigrate:
- Memory requests should be set
- CPU requests should be set
- Image pull policy should be "Always"
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Not running as privileged
- Image tag is specified
- Host port is not configured
- Filesystem is read only
- Privilege escalation not allowed
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Container does not have any insecure capabilities
Spec: no checks applied
Spec:
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container postgres:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Liveness probe should be configured
- Filesystem should be read only
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Readiness probe should be configured
- Should not be allowed to run as root
- CPU requests are set
- Container does not have any dangerous capabilities
- Host port is not configured
- Memory requests are set
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Image tag is specified
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host PID is not configured
- Host IPC is not configured
- Host network is not configured
Container kratos-dotgovpasskratos-courier:
- Liveness probe should be configured
- Memory requests should be set
- Readiness probe should be configured
- Image pull policy should be "Always"
- CPU requests should be set
- Container does not have any dangerous capabilities
- Container does not have any insecure capabilities
- Privilege escalation not allowed
- Is not allowed to run as root
- Filesystem is read only
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
Namespace: dotgovpay
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container absa:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory requests should be set
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Filesystem should be read only
- Image pull policy should be "Always"
- CPU requests should be set
- Container does not have any dangerous capabilities
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- Host port is not configured
- Liveness probe is configured
- Image tag is specified
- Not running as privileged
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container admin:
- Privilege escalation should not be allowed
- The container sets potentially sensitive environment variables
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Should not be allowed to run as root
- Memory requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- CPU requests should be set
- Container should not have insecure capabilities
- Host port is not configured
- Readiness probe is configured
- Not running as privileged
- Image tag is specified
- Container does not have any dangerous capabilities
- Liveness probe is configured
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container airtel:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Filesystem should be read only
- Should not be allowed to run as root
- CPU requests should be set
- Memory requests should be set
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Liveness probe is configured
- Host port is not configured
- Readiness probe is configured
- Image tag is specified
- Container does not have any dangerous capabilities
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container callbackhandler:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- CPU requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Memory requests should be set
- Should not be allowed to run as root
- Container does not have any dangerous capabilities
- Liveness probe is configured
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Host port is not configured
- Readiness probe is configured
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container ecobank:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory requests should be set
- Image pull policy should be "Always"
- Should not be allowed to run as root
- CPU requests should be set
- Container should not have insecure capabilities
- Filesystem should be read only
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Liveness probe is configured
- Image tag is specified
- Not running as privileged
- Host port is not configured
- Readiness probe is configured
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host PID is not configured
- Host IPC is not configured
- Host network is not configured
Container ifmis:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- CPU requests should be set
- Filesystem should be read only
- Should not be allowed to run as root
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Memory requests should be set
- The container does not set potentially sensitive environment variables
- Not running as privileged
- Image tag is specified
- Liveness probe is configured
- Readiness probe is configured
- Container does not have any dangerous capabilities
- Host port is not configured
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host network is not configured
- Host PID is not configured
- Host IPC is not configured
Container izb:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Memory requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- Should not be allowed to run as root
- CPU requests should be set
- Host port is not configured
- Liveness probe is configured
- Image tag is specified
- Container does not have any dangerous capabilities
- Readiness probe is configured
- Not running as privileged
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container mtn:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Container should not have insecure capabilities
- Filesystem should be read only
- CPU requests should be set
- Memory requests should be set
- Should not be allowed to run as root
- Image pull policy should be "Always"
- Not running as privileged
- Container does not have any dangerous capabilities
- Image tag is specified
- Host port is not configured
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
- Readiness probe is configured
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container payments:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- The container sets potentially sensitive environment variables
- CPU requests should be set
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Memory requests should be set
- Filesystem should be read only
- Should not be allowed to run as root
- Host port is not configured
- Readiness probe is configured
- Image tag is specified
- Container does not have any dangerous capabilities
- Liveness probe is configured
- Not running as privileged
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container pdf:
- The container sets potentially sensitive environment variables
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Memory requests should be set
- CPU requests should be set
- Container should not have insecure capabilities
- Filesystem should be read only
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Liveness probe is configured
- Host port is not configured
- Readiness probe is configured
- Image tag is specified
- Not running as privileged
- Container does not have any dangerous capabilities
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container reports:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- CPU requests should be set
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Filesystem should be read only
- Memory requests should be set
- Container does not have any dangerous capabilities
- Host port is not configured
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- Liveness probe is configured
- Not running as privileged
- Image tag is specified
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container stanbicbank:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory requests should be set
- CPU requests should be set
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Filesystem should be read only
- Should not be allowed to run as root
- Host port is not configured
- Not running as privileged
- Liveness probe is configured
- Image tag is specified
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container stanbicbankussd:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- The container sets potentially sensitive environment variables
- Privilege escalation should not be allowed
- CPU requests should be set
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Memory requests should be set
- Filesystem should be read only
- Container does not have any dangerous capabilities
- Readiness probe is configured
- Image tag is specified
- Liveness probe is configured
- Host port is not configured
- Not running as privileged
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container tengamobilewallet:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- CPU requests should be set
- Should not be allowed to run as root
- Filesystem should be read only
- Memory requests should be set
- Image pull policy should be "Always"
- Container does not have any dangerous capabilities
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
- Readiness probe is configured
- Not running as privileged
- Host port is not configured
- Image tag is specified
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container transactionjunction:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- CPU requests should be set
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Filesystem should be read only
- Memory requests should be set
- Should not be allowed to run as root
- Container does not have any dangerous capabilities
- Host port is not configured
- Readiness probe is configured
- Not running as privileged
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
- Image tag is specified
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container ui:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Filesystem should be read only
- CPU requests should be set
- Memory requests should be set
- Should not be allowed to run as root
- Readiness probe is configured
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Liveness probe is configured
- Host port is not configured
- Image tag is specified
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container zamtel:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Container should not have insecure capabilities
- Memory requests should be set
- Should not be allowed to run as root
- Image pull policy should be "Always"
- CPU requests should be set
- Filesystem should be read only
- Host port is not configured
- Liveness probe is configured
- Not running as privileged
- Container does not have any dangerous capabilities
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Readiness probe is configured
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container zanaco:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- CPU requests should be set
- Memory requests should be set
- Should not be allowed to run as root
- Filesystem should be read only
- Container should not have insecure capabilities
- Image pull policy should be "Always"
- Container does not have any dangerous capabilities
- Host port is not configured
- Liveness probe is configured
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Not running as privileged
Spec: no checks applied
Spec: no checks applied
Namespace: dotgovpki
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host network is not configured
- Host PID is not configured
- Host IPC is not configured
Container admin:
- The container sets potentially sensitive environment variables
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- CPU requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Memory requests should be set
- Container does not have any dangerous capabilities
- Host port is not configured
- Image tag is specified
- Liveness probe is configured
- Readiness probe is configured
- Not running as privileged
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host PID is not configured
- Host IPC is not configured
- Host network is not configured
Container api:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Filesystem should be read only
- Memory requests should be set
- Should not be allowed to run as root
- Image pull policy should be "Always"
- CPU requests should be set
- Container should not have insecure capabilities
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Not running as privileged
- Container does not have any dangerous capabilities
- Readiness probe is configured
- Host port is not configured
- Liveness probe is configured
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container mobile:
- Privilege escalation should not be allowed
- The container sets potentially sensitive environment variables
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Filesystem should be read only
- Container should not have insecure capabilities
- Memory requests should be set
- Should not be allowed to run as root
- Image pull policy should be "Always"
- CPU requests should be set
- Host port is not configured
- Liveness probe is configured
- Readiness probe is configured
- Not running as privileged
- Image tag is specified
- Container does not have any dangerous capabilities
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container systemsmanager:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Memory requests should be set
- Filesystem should be read only
- CPU requests should be set
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Not running as privileged
- Image tag is specified
- Liveness probe is configured
- Container does not have any dangerous capabilities
- Host port is not configured
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container systemsmanageradmin:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- The container sets potentially sensitive environment variables
- Should not be allowed to run as root
- Container should not have insecure capabilities
- Memory requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- CPU requests should be set
- Not running as privileged
- Readiness probe is configured
- Container does not have any dangerous capabilities
- Host port is not configured
- Liveness probe is configured
- Image tag is specified
Spec:
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: dotgovshortener
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container api:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Image pull policy should be "Always"
- CPU requests should be set
- Memory requests should be set
- Filesystem should be read only
- Should not be allowed to run as root
- Container should not have insecure capabilities
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Liveness probe is configured
- Not running as privileged
- Image tag is specified
- Host port is not configured
- Readiness probe is configured
Spec:
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: dotgovsign
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host PID is not configured
- Host IPC is not configured
- Host network is not configured
Container api:
- The container sets potentially sensitive environment variables
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Container should not have insecure capabilities
- CPU requests should be set
- Memory requests should be set
- Filesystem should be read only
- Should not be allowed to run as root
- Image pull policy should be "Always"
- Container does not have any dangerous capabilities
- Liveness probe is configured
- Readiness probe is configured
- Image tag is specified
- Host port is not configured
- Not running as privileged
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container ui:
- Privilege escalation should not be allowed
- The container sets potentially sensitive environment variables
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- CPU requests should be set
- Container should not have insecure capabilities
- Should not be allowed to run as root
- Memory requests should be set
- Image pull policy should be "Always"
- Filesystem should be read only
- Liveness probe is configured
- Container does not have any dangerous capabilities
- Readiness probe is configured
- Host port is not configured
- Not running as privileged
- Image tag is specified
Spec:
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: dotgovstyle
Spec:
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Namespace: ingress-nginx
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container controller:
- Filesystem should be read only
- Image pull policy should be "Always"
- Memory requests are set
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Container does not have any insecure capabilities
- Readiness probe is configured
- Is not allowed to run as root
- Container does not have any dangerous capabilities
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Liveness probe is configured
- Privilege escalation not allowed
- Image tag is specified
- CPU requests are set
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Namespace: kube-node-lease
Spec: no checks applied
Spec: no checks applied
Namespace: kube-public
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: kube-system
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container cni-installer: no checks applied
Container cns-container: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container cni-installer: no checks applied
Container cns-container: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container azure-ip-masq-agent: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container install-cni-binaries: no checks applied
Container mount-cgroup: no checks applied
Container apply-sysctl-overwrites: no checks applied
Container mount-bpf-fs: no checks applied
Container clean-cilium-state: no checks applied
Container block-wireserver: no checks applied
Container cilium-agent: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container cloud-node-manager: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container cloud-node-manager: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container liveness-probe: no checks applied
Container node-driver-registrar: no checks applied
Container azuredisk: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container init: no checks applied
Container node-driver-registrar: no checks applied
Container azuredisk: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container liveness-probe: no checks applied
Container node-driver-registrar: no checks applied
Container azurefile: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container init: no checks applied
Container node-driver-registrar: no checks applied
Container azurefile: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container pause: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container cilium-operator: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container coredns: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container autoscaler: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container konnectivity-agent: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container autoscaler: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container metrics-server-vpa: no checks applied
Container metrics-server: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: kuma-uptime
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container kuma-uptime:
- Image tag should be specified
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Privilege escalation should not be allowed
- Filesystem should be read only
- Should not be allowed to run as root
- Container should not have insecure capabilities
- CPU requests are set
- Container does not have any dangerous capabilities
- Liveness probe is configured
- Memory requests are set
- The container does not set potentially sensitive environment variables
- Host port is not configured
- Image pull policy is "Always"
- Readiness probe is configured
- Not running as privileged
Container kuma-manager:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Liveness probe should be configured
- Filesystem should be read only
- Image pull policy should be "Always"
- Should not be allowed to run as root
- Readiness probe should be configured
- Container should not have insecure capabilities
- Image tag is specified
- Host port is not configured
- CPU requests are set
- Memory requests are set
- The container does not set potentially sensitive environment variables
- Container does not have any dangerous capabilities
- Not running as privileged
Spec: no checks applied
Namespace: playwright
Spec:
- The RoleBinding references a Role with wildcard permissions
- The RoleBinding references a ClusterRole that allows Pods/exec, allows pods/attach, or that does not exist
- The RoleBinding references the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Namespace: polaris
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Pod Spec: no checks applied
Container dashboard: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: postgres-operator
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container postgres-operator:
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Liveness probe should be configured
- Image pull policy should be "Always"
- Readiness probe is configured
- Image tag is specified
- CPU requests are set
- Memory requests are set
- Container does not have any dangerous capabilities
- Host port is not configured
- The container does not set potentially sensitive environment variables
- Filesystem is read only
- Not running as privileged
- Is not allowed to run as root
- Privilege escalation not allowed
Spec: no checks applied
Spec: no checks applied
Namespace: rabbitmq-ha
Spec: no checks applied
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Namespace: rabbitmq-operator
Spec:
Pod Spec:
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container rabbitmq-cluster-operator:
- Image pull policy should be "Always"
- Host port is not configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Liveness probe is configured
- Not running as privileged
- Memory requests are set
- Readiness probe is configured
- Image tag is specified
- Is not allowed to run as root
- The container does not set potentially sensitive environment variables
- CPU requests are set
- Container does not have any dangerous capabilities
- Privilege escalation not allowed
- Container does not have any insecure capabilities
- Filesystem is read only
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container rabbitmq-cluster-operator:
- The container sets potentially sensitive environment variables
- Image pull policy should be "Always"
- Container does not have any insecure capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Memory requests are set
- Readiness probe is configured
- Filesystem is read only
- Privilege escalation not allowed
- Is not allowed to run as root
- Liveness probe is configured
- Image tag is specified
- Container does not have any dangerous capabilities
- Host port is not configured
- Not running as privileged
- CPU requests are set
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Spec: no checks applied
Namespace: redis-ha
Spec: no checks applied
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host PID is not configured
- Host IPC is not configured
- Host network is not configured
Container redis-ha:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Memory requests should be set
- Filesystem should be read only
- Image pull policy should be "Always"
- CPU requests should be set
- Should not be allowed to run as root
- Container does not have any dangerous capabilities
- Readiness probe is configured
- Not running as privileged
- Host port is not configured
- Image tag is specified
- Liveness probe is configured
- The container does not set potentially sensitive environment variables
Namespace: redis-operator
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host PID is not configured
- Host IPC is not configured
- Host network is not configured
Container redis-operator:
- Privilege escalation should not be allowed
- Use one of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities to restrict containers using unwanted privileges
- Container should not have insecure capabilities
- Filesystem should be read only
- Should not be allowed to run as root
- Host port is not configured
- The container does not set potentially sensitive environment variables
- Image tag is specified
- Liveness probe is configured
- Image pull policy is "Always"
- Readiness probe is configured
- Container does not have any dangerous capabilities
- Memory requests are set
- Not running as privileged
- CPU requests are set
Spec: no checks applied
Spec: no checks applied
Namespace: reloader
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host PID is not configured
- Host IPC is not configured
- Host network is not configured
Container reloader-reloader:
- Privilege escalation should not be allowed
- Image pull policy should be "Always"
- Container should not have insecure capabilities
- Filesystem should be read only
- CPU requests are set
- Container does not have any dangerous capabilities
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Liveness probe is configured
- Memory requests are set
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- Host port is not configured
- Not running as privileged
- Image tag is specified
- Is not allowed to run as root
Spec:
- The RoleBinding does not reference the default cluster-admin ClusterRole or one with wildcard permissions
- The RoleBinding does not reference a Role with wildcard permissions
- The RoleBinding does not reference a ClusterRole allowing pods/exec or pods/attach
- The RoleBinding does not reference a Role allowing Pod exec or attach
Spec: no checks applied
Spec: no checks applied
Namespace: vpa
Spec:
Pod Spec:
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container vpa:
- Liveness probe is configured
- Memory requests are set
- The container does not set potentially sensitive environment variables
- Host port is not configured
- Container does not have any insecure capabilities
- Is not allowed to run as root
- Image tag is specified
- Privilege escalation not allowed
- Image pull policy is "Always"
- Readiness probe is configured
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Filesystem is read only
- Not running as privileged
- CPU requests are set
- Container does not have any dangerous capabilities
Spec:
Pod Spec:
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container vpa:
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Memory requests are set
- Image pull policy is "Always"
- Readiness probe is configured
- CPU requests are set
- Container does not have any insecure capabilities
- Liveness probe is configured
- Filesystem is read only
- Privilege escalation not allowed
- Is not allowed to run as root
- Container does not have any dangerous capabilities
- Host port is not configured
- Not running as privileged
- The container does not set potentially sensitive environment variables
- Image tag is specified
Spec:
Pod Spec:
- Priority class should be set
- Pod should be configured with a valid topology spread constraint
- The ServiceAccount will be automounted
- A NetworkPolicy should match pod labels and contain applied egress and ingress rules
- Host IPC is not configured
- Host network is not configured
- Host PID is not configured
Container vpa:
- Image pull policy is "Always"
- Memory requests are set
- Filesystem is read only
- Privilege escalation not allowed
- Not running as privileged
- CPU requests are set
- Host port is not configured
- Container does not have any insecure capabilities
- Readiness probe is configured
- The container does not set potentially sensitive environment variables
- One of AppArmor, Seccomp, SELinux, or dropping Linux Capabilities are used to restrict containers using unwanted privileges
- Is not allowed to run as root
- Image tag is specified
- Container does not have any dangerous capabilities
- Liveness probe is configured