Skip to content

Commit

Permalink
Merge pull request #627 from kubescape/builtin-att
Browse files Browse the repository at this point in the history
add builtin attribute to fw
  • Loading branch information
YiscahLevySilas1 authored Jun 4, 2024
2 parents d2c245c + d01a7f7 commit 5cb34b5
Show file tree
Hide file tree
Showing 13 changed files with 36 additions and 13 deletions.
4 changes: 3 additions & 1 deletion frameworks/__YAMLscan.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{
"name": "YAML-scanning",
"description": "Controls relevant to yamls",
"attributes": {},
"attributes": {
"builtin": true
},
"scanningScope": {
"matches": [
"file"
Expand Down
4 changes: 3 additions & 1 deletion frameworks/allcontrols.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{
"name": "AllControls",
"description": "Contains all the controls from all the frameworks",
"attributes": {},
"attributes": {
"builtin": true
},
"scanningScope": {
"matches": [
"cluster",
Expand Down
4 changes: 3 additions & 1 deletion frameworks/armobest.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{
"name": "ArmoBest",
"description": "",
"attributes": {},
"attributes": {
"builtin": true
},
"scanningScope": {
"matches": [
"cluster",
Expand Down
3 changes: 2 additions & 1 deletion frameworks/cis-aks-t1.2.0.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,8 @@
"name": "cis-aks-t1.2.0",
"description": "Testing CIS for Azure Kubernetes Service (AKS) as suggested by CIS benchmark: https://workbench.cisecurity.org/benchmarks/9058",
"attributes": {
"version": "v1.2.0"
"version": "v1.2.0",
"builtin": true
},
"scanningScope": {
"matches": [
Expand Down
3 changes: 2 additions & 1 deletion frameworks/cis-eks-t1.2.0.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,8 @@
"name": "cis-eks-t1.2.0",
"description": "Testing CIS for Amazon Elastic Kubernetes Service (EKS) as suggested by CIS benchmark: https://workbench.cisecurity.org/benchmarks/9681",
"attributes": {
"version": "v1.2.0"
"version": "v1.2.0",
"builtin": true
},
"scanningScope": {
"matches": [
Expand Down
3 changes: 2 additions & 1 deletion frameworks/cis-v1.23-t1.0.1.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,8 @@
"name": "cis-v1.23-t1.0.1",
"description": "Testing CIS for Kubernetes as suggested by CIS in https://workbench.cisecurity.org/benchmarks/8973",
"attributes": {
"version": "v1.0.1"
"version": "v1.0.1",
"builtin": true
},
"scanningScope": {
"matches": [
Expand Down
4 changes: 3 additions & 1 deletion frameworks/clusterscan.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{
"name": "ClusterScan",
"description": "Framework for scanning a cluster",
"attributes": {},
"attributes": {
"builtin": true
},
"typeTags": [
"security"
],
Expand Down
4 changes: 3 additions & 1 deletion frameworks/devopsbest.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{
"name": "DevOpsBest",
"description": "",
"attributes": {},
"attributes": {
"builtin": true
},
"scanningScope": {
"matches": [
"cluster",
Expand Down
4 changes: 3 additions & 1 deletion frameworks/mitre.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{
"name": "MITRE",
"description": "Testing MITRE for Kubernetes as suggested by microsoft in https://www.microsoft.com/security/blog/wp-content/uploads/2020/04/k8s-matrix.png",
"attributes": {},
"attributes": {
"builtin": true
},
"scanningScope": {
"matches": [
"cluster",
Expand Down
4 changes: 3 additions & 1 deletion frameworks/nsaframework.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{
"name": "NSA",
"description": "Implement NSA security advices for K8s ",
"attributes": {},
"attributes": {
"builtin": true
},
"scanningScope": {
"matches": [
"cluster",
Expand Down
4 changes: 3 additions & 1 deletion frameworks/security.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{
"name": "security",
"description": "Controls that are used to assess security threats.",
"attributes": {},
"attributes": {
"builtin": true
},
"typeTags": [
"security"
],
Expand Down
4 changes: 3 additions & 1 deletion frameworks/soc2.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{
"name": "SOC2",
"description": "SOC2 compliance related controls",
"attributes": {},
"attributes": {
"builtin": true
},
"scanningScope": {
"matches": [
"cluster",
Expand Down
4 changes: 3 additions & 1 deletion frameworks/workloadscan.json
Original file line number Diff line number Diff line change
@@ -1,7 +1,9 @@
{
"name": "WorkloadScan",
"description": "Framework for scanning a workload",
"attributes": {},
"attributes": {
"builtin": true
},
"typeTags": [
"security"
],
Expand Down

0 comments on commit 5cb34b5

Please sign in to comment.