Back to Kubescape

Kubescape Scan Report

examples/output_mocks/html-format.html

4.0.621.7 KB
Original Source

Kubescape Scan Report

Summary

AllFailedSkipped
652310

Details

SeverityControl NameFailed ResourcesAll ResourcesRisk Score, %
CriticalAPI server insecure port is enabled010
CriticalCVE-2022-39328-grafana-auth-bypass000
CriticalDisable anonymous access to Kubelet service000
CriticalEnforce Kubelet client TLS authentication000
HighApplications credentials in configuration files0430
HighCVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability000
HighCVE-2022-23648-containerd-fs-escape010
HighCVE-2022-47633-kyverno-signature-bypass000
HighForbidden Container Registries0190
HighHost PID/IPC privileges0190
HighHostNetwork access0190
HighHostPath mount0190
HighInsecure capabilities0190
HighInstance Metadata API000
HighList Kubernetes secrets3744
HighPrivileged container0190
HighRBAC enabled010
HighResource limits71944
HighResources CPU limit and request0190
HighResources memory limit and request0190
HighWorkloads with Critical vulnerabilities exposed to external traffic000
HighWorkloads with RCE vulnerabilities exposed to external traffic000
HighWritable hostPath mount0190
MediumAccess container service account1462
MediumAllow privilege escalation41930
MediumAudit logs enabled11100
MediumAutomatic mapping of service account46210
MediumCVE-2021-25741 - Using symlink for arbitrary host file system access.000
MediumCVE-2022-0185-linux-kernel-container-escape010
MediumCVE-2022-24348-argocddirtraversal000
MediumCluster internal networking1520
MediumCluster-admin binding0740
MediumConfigured liveness probe71944
MediumContainer hostPort0190
MediumContainers mounting Docker socket0190
MediumCoreDNS poisoning1741
MediumData Destruction2743
MediumDelete Kubernetes events0740
MediumExec into container0740
MediumExposed sensitive interfaces000
MediumImages from allowed registry0190
MediumIngress and Egress blocked71944
MediumLinux hardening71944
MediumMalicious admission controller (mutating)000
MediumMount service principal0190
MediumNo impersonation0740
MediumNon-root containers41930
MediumPortforwarding privileges0740
MediumSecret/ETCD encryption enabled11100
MediumSudo in container entrypoint0190
MediumWorkloads with excessive amount of vulnerabilities000
LowAccess Kubernetes dashboard0930
LowConfigured readiness probe71944
LowImage pull policy on latest tag0190
LowImmutable container filesystem41930
LowK8s common labels usage51934
LowKubernetes CronJob55100
LowLabel usage for resources31914
LowMalicious admission controller (validating)000
LowNaked PODs0310
LowNetwork mapping1520
LowPSP enabled11100
LowPods in default namespace21920
LowSSH server running inside container010

Failed Resources

Name: kubescape

ApiVersion: v1

Kind: Namespace

Name: kubescape

Namespace:

SeverityNameDocsAssisted Remediation
LowNetwork mappingC-0049
MediumCluster internal networkingC-0054

Name: nginx-1

ApiVersion: apps/v1

Kind: Deployment

Name: nginx-1

Namespace: default

SeverityNameDocsAssisted Remediation
MediumAllow privilege escalationC-0016

spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false

| | Medium | Ingress and Egress blocked | C-0030 | | | High | Resource limits | C-0009 |

spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE

spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE

| | Low | Configured readiness probe | C-0018 |

spec.template.spec.containers[0].readinessProbe=YOUR_VALUE

| | Medium | Non-root containers | C-0013 |

spec.template.spec.containers[0].securityContext.runAsNonRoot=true

spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false

| | Medium | Automatic mapping of service account | C-0034 |

spec.template.spec.automountServiceAccountToken=false

| | Medium | Linux hardening | C-0055 |

spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE

spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE

spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE

| | Medium | Configured liveness probe | C-0056 |

spec.template.spec.containers[0].livenessProbe=YOUR_VALUE

| | Low | K8s common labels usage | C-0077 |

metadata.labels=YOUR_VALUE

spec.template.metadata.labels=YOUR_VALUE

| | Low | Pods in default namespace | C-0061 |

metadata.namespace

| | Low | Immutable container filesystem | C-0017 |

spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true

|

Name: kubescape-sneeffer-service-account

ApiVersion:

Kind: ServiceAccount

Name: kubescape-sneeffer-service-account

Namespace: default

SeverityNameDocsAssisted Remediation
MediumAccess container service accountC-0053

Name: kubescape-sneeffer-service-account

ApiVersion: v1

Kind: ServiceAccount

Name: kubescape-sneeffer-service-account

Namespace: default

SeverityNameDocsAssisted Remediation
MediumAutomatic mapping of service accountC-0034

automountServiceAccountToken=false

|

Name: nginx

ApiVersion: apps/v1

Kind: Deployment

Name: nginx

Namespace: default

SeverityNameDocsAssisted Remediation
MediumAllow privilege escalationC-0016

spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false

| | Medium | Ingress and Egress blocked | C-0030 | | | High | Resource limits | C-0009 |

spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE

spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE

| | Low | Configured readiness probe | C-0018 |

spec.template.spec.containers[0].readinessProbe=YOUR_VALUE

| | Medium | Non-root containers | C-0013 |

spec.template.spec.containers[0].securityContext.runAsNonRoot=true

spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false

| | Medium | Automatic mapping of service account | C-0034 |

spec.template.spec.automountServiceAccountToken=false

| | Medium | Linux hardening | C-0055 |

spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE

spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE

spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE

| | Medium | Configured liveness probe | C-0056 |

spec.template.spec.containers[0].livenessProbe=YOUR_VALUE

| | Low | K8s common labels usage | C-0077 |

metadata.labels=YOUR_VALUE

spec.template.metadata.labels=YOUR_VALUE

| | Low | Pods in default namespace | C-0061 |

metadata.namespace

| | Low | Immutable container filesystem | C-0017 |

spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true

|

Name: kube-apiserver-dwertent

ApiVersion: v1

Kind: Pod

Name: kube-apiserver-dwertent

Namespace: kube-system

SeverityNameDocsAssisted Remediation
MediumAudit logs enabledC-0067

spec.containers[0].command

| | Low | PSP enabled | C-0068 |

spec.containers[0].command[5]

| | Medium | Secret/ETCD encryption enabled | C-0066 |

spec.containers[0].command

|

Name: kubescape-sa

ApiVersion:

Kind: ServiceAccount

Name: kubescape-sa

Namespace: kubescape

SeverityNameDocsAssisted Remediation
MediumData DestructionC-0007

relatedObjects[1].rules[1].resources[1]

relatedObjects[1].rules[1].verbs[0]

relatedObjects[1].rules[1].apiGroups[0]

relatedObjects[1].rules[1].apiGroups[1]

relatedObjects[0].subjects[0]

relatedObjects[0].roleRef.name

| | High | List Kubernetes secrets | C-0015 |

relatedObjects[1].rules[0].resources[0]

relatedObjects[1].rules[0].verbs[0]

relatedObjects[1].rules[0].verbs[1]

relatedObjects[1].rules[0].verbs[3]

relatedObjects[1].rules[0].apiGroups[0]

relatedObjects[0].subjects[0]

relatedObjects[0].roleRef.name

|

Name: default

ApiVersion: v1

Kind: ServiceAccount

Name: default

Namespace: kubescape

SeverityNameDocsAssisted Remediation
MediumAutomatic mapping of service accountC-0034

automountServiceAccountToken=false

|

Name: kubescape-registry-scan-1809488850697420828

ApiVersion: batch/v1

Kind: CronJob

Name: kubescape-registry-scan-1809488850697420828

Namespace: kubescape

SeverityNameDocsAssisted Remediation
MediumIngress and Egress blockedC-0030
HighResource limitsC-0009

spec.jobTemplate.spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE

| | Low | Configured readiness probe | C-0018 |

spec.jobTemplate.spec.template.spec.containers[0].readinessProbe=YOUR_VALUE

| | Low | Kubernetes CronJob | C-0026 | | | Low | Label usage for resources | C-0076 |

spec.jobTemplate.spec.template.metadata.labels=YOUR_VALUE

| | Medium | Linux hardening | C-0055 |

spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE

| | Medium | Configured liveness probe | C-0056 |

spec.jobTemplate.spec.template.spec.containers[0].livenessProbe=YOUR_VALUE

| | Low | K8s common labels usage | C-0077 |

metadata.labels=YOUR_VALUE

spec.jobTemplate.spec.template.metadata.labels=YOUR_VALUE

|

Name: kubescape-scheduler

ApiVersion: batch/v1

Kind: CronJob

Name: kubescape-scheduler

Namespace: kubescape

SeverityNameDocsAssisted Remediation
MediumAllow privilege escalationC-0016

spec.jobTemplate.spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false

| | Medium | Ingress and Egress blocked | C-0030 | | | High | Resource limits | C-0009 |

spec.jobTemplate.spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE

| | Low | Configured readiness probe | C-0018 |

spec.jobTemplate.spec.template.spec.containers[0].readinessProbe=YOUR_VALUE

| | Low | Kubernetes CronJob | C-0026 | | | Medium | Non-root containers | C-0013 |

spec.jobTemplate.spec.template.spec.containers[0].securityContext.runAsNonRoot=true

spec.jobTemplate.spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false

| | Medium | Linux hardening | C-0055 |

spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE

| | Medium | Configured liveness probe | C-0056 |

spec.jobTemplate.spec.template.spec.containers[0].livenessProbe=YOUR_VALUE

| | Low | Immutable container filesystem | C-0017 |

spec.jobTemplate.spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true

|

Name: ks-sa

ApiVersion:

Kind: ServiceAccount

Name: ks-sa

Namespace: kubescape

SeverityNameDocsAssisted Remediation
MediumData DestructionC-0007

relatedObjects[1].rules[1].resources[0]

relatedObjects[1].rules[1].verbs[0]

relatedObjects[1].rules[1].apiGroups[0]

relatedObjects[0].subjects[0]

relatedObjects[0].roleRef.name

relatedObjects[1].rules[2].resources[1]

relatedObjects[1].rules[2].verbs[0]

relatedObjects[1].rules[2].apiGroups[0]

relatedObjects[0].subjects[0]

relatedObjects[0].roleRef.name

| | Medium | CoreDNS poisoning | C-0037 |

relatedObjects[1].rules[2].resources[0]

relatedObjects[1].rules[2].verbs[0]

relatedObjects[1].rules[2].apiGroups[0]

relatedObjects[0].subjects[0]

relatedObjects[0].roleRef.name

| | High | List Kubernetes secrets | C-0015 |

relatedObjects[1].rules[0].resources[0]

relatedObjects[1].rules[0].verbs[0]

relatedObjects[1].rules[0].verbs[1]

relatedObjects[1].rules[0].apiGroups[0]

relatedObjects[0].subjects[0]

relatedObjects[0].roleRef.name

relatedObjects[1].rules[2].resources[1]

relatedObjects[1].rules[2].verbs[0]

relatedObjects[1].rules[2].apiGroups[0]

relatedObjects[0].subjects[0]

relatedObjects[0].roleRef.name

|

Name: ks-scheduled-scan-armobest-1968464821027741247

ApiVersion: batch/v1

Kind: CronJob

Name: ks-scheduled-scan-armobest-1968464821027741247

Namespace: kubescape

SeverityNameDocsAssisted Remediation
MediumIngress and Egress blockedC-0030
HighResource limitsC-0009

spec.jobTemplate.spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE

| | Low | Configured readiness probe | C-0018 |

spec.jobTemplate.spec.template.spec.containers[0].readinessProbe=YOUR_VALUE

| | Low | Kubernetes CronJob | C-0026 | | | Low | Label usage for resources | C-0076 |

spec.jobTemplate.spec.template.metadata.labels=YOUR_VALUE

| | Medium | Linux hardening | C-0055 |

spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE

| | Medium | Configured liveness probe | C-0056 |

spec.jobTemplate.spec.template.spec.containers[0].livenessProbe=YOUR_VALUE

| | Low | K8s common labels usage | C-0077 |

metadata.labels=YOUR_VALUE

spec.jobTemplate.spec.template.metadata.labels=YOUR_VALUE

|

Name: ks-scheduled-scan-cis-v1-23-t1-0-1-70343785476262573

ApiVersion: batch/v1

Kind: CronJob

Name: ks-scheduled-scan-cis-v1-23-t1-0-1-70343785476262573

Namespace: kubescape

SeverityNameDocsAssisted Remediation
MediumIngress and Egress blockedC-0030
HighResource limitsC-0009

spec.jobTemplate.spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE

| | Low | Configured readiness probe | C-0018 |

spec.jobTemplate.spec.template.spec.containers[0].readinessProbe=YOUR_VALUE

| | Low | Kubernetes CronJob | C-0026 | | | Low | Label usage for resources | C-0076 |

spec.jobTemplate.spec.template.metadata.labels=YOUR_VALUE

| | Medium | Linux hardening | C-0055 |

spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE

| | Medium | Configured liveness probe | C-0056 |

spec.jobTemplate.spec.template.spec.containers[0].livenessProbe=YOUR_VALUE

| | Low | K8s common labels usage | C-0077 |

metadata.labels=YOUR_VALUE

spec.jobTemplate.spec.template.metadata.labels=YOUR_VALUE

|

Name: ks-sa

ApiVersion:

Kind: ServiceAccount

Name: ks-sa

Namespace: kubescape

SeverityNameDocsAssisted Remediation
HighList Kubernetes secretsC-0015

relatedObjects[1].rules[0].resources[0]

relatedObjects[1].rules[0].verbs[0]

relatedObjects[1].rules[0].verbs[1]

relatedObjects[1].rules[0].verbs[2]

relatedObjects[1].rules[0].apiGroups[0]

relatedObjects[0].subjects[0]

relatedObjects[0].roleRef.name

|

Name: kubevuln-scheduler

ApiVersion: batch/v1

Kind: CronJob

Name: kubevuln-scheduler

Namespace: kubescape

SeverityNameDocsAssisted Remediation
MediumAllow privilege escalationC-0016

spec.jobTemplate.spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false

| | Medium | Ingress and Egress blocked | C-0030 | | | High | Resource limits | C-0009 |

spec.jobTemplate.spec.template.spec.containers[0].resources.limits.cpu=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].resources.limits.memory=YOUR_VALUE

| | Low | Configured readiness probe | C-0018 |

spec.jobTemplate.spec.template.spec.containers[0].readinessProbe=YOUR_VALUE

| | Low | Kubernetes CronJob | C-0026 | | | Medium | Non-root containers | C-0013 |

spec.jobTemplate.spec.template.spec.containers[0].securityContext.runAsNonRoot=true

spec.jobTemplate.spec.template.spec.containers[0].securityContext.allowPrivilegeEscalation=false

| | Medium | Linux hardening | C-0055 |

spec.jobTemplate.spec.template.spec.containers[0].securityContext.seccompProfile=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].securityContext.seLinuxOptions=YOUR_VALUE

spec.jobTemplate.spec.template.spec.containers[0].securityContext.capabilities.drop[0]=YOUR_VALUE

| | Medium | Configured liveness probe | C-0056 |

spec.jobTemplate.spec.template.spec.containers[0].livenessProbe=YOUR_VALUE

| | Low | Immutable container filesystem | C-0017 |

spec.jobTemplate.spec.template.spec.containers[0].securityContext.readOnlyRootFilesystem=true

|