-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix control C-0211 #501
Fix control C-0211 #501
Conversation
Signed-off-by: YiscahLevySilas1 <[email protected]>
Signed-off-by: YiscahLevySilas1 <[email protected]>
metadata: | ||
name: sysctl-example | ||
spec: | ||
securityContext: |
Check warning
Code scanning / kubescape
CIS-4.4.2 Consider external secret storage
- name: kernel.shm_rmid_forced | ||
value: "0" | ||
containers: | ||
- name: sysctl-test-container |
Check warning
Code scanning / kubescape
Allow privilege escalation
- name: kernel.shm_rmid_forced | ||
value: "0" | ||
containers: | ||
- name: sysctl-test-container |
Check warning
Code scanning / kubescape
Non-root containers
@@ -0,0 +1,15 @@ | |||
apiVersion: v1 |
Check warning
Code scanning / kubescape
Ingress and Egress blocked
- name: kernel.shm_rmid_forced | ||
value: "0" | ||
containers: | ||
- name: sysctl-test-container |
Check warning
Code scanning / kubescape
Resource limits
- name: kernel.shm_rmid_forced | ||
value: "0" | ||
containers: | ||
- name: sysctl-test-container |
Check warning
Code scanning / kubescape
CIS-5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
apiVersion: v1 | ||
kind: Pod | ||
metadata: | ||
name: sysctl-example |
Check warning
Code scanning / kubescape
CIS-5.7.4 The default namespace should not be used
- name: kernel.shm_rmid_forced | ||
value: "0" | ||
containers: | ||
- name: sysctl-test-container |
Check warning
Code scanning / kubescape
Linux hardening
- name: kernel.shm_rmid_forced | ||
value: "0" | ||
containers: | ||
- name: sysctl-test-container |
Check notice
Code scanning / kubescape
Immutable container filesystem
name: sysctl-example | ||
spec: | ||
securityContext: | ||
sysctls: |
Check warning
Code scanning / kubescape
CIS-5.7.3 Apply Security Context to Your Pods and Containers
PR Analysis
PR Feedback
How to use
|
Summary:
|
PR Type:
Bug fix, Tests
PR Description:
This PR fixes a typo in the security context parameter, changing 'systctls' to the correct 'sysctls'. The typo was present in various files including JSON, rego, and YAML files. The changes also include the addition of test cases to verify the correct behavior after the typo fix.
PR Main Files Walkthrough:
controls/C-0211-applysecuritycontexttoyourpodsandcontainers.json
: Fixed the typo in the security context parameter from 'systctls' to 'sysctls'.rules/set-sysctls-params/raw.rego
: Updated the security context parameter from 'systctls' to 'sysctls' in the rego rules.rules/set-sysctls-params/rule.metadata.json
: Corrected the typo in the rule metadata from 'systctls' to 'sysctls'.rules/set-sysctls-params/test/cronjob/expected.json
: Updated the expected test results to reflect the corrected security context parameter.rules/set-sysctls-params/test/cronjob/input/cronjob1.yaml
: Added a new test case for a CronJob with the corrected security context parameter.rules/set-sysctls-params/test/pod-pass/input/pod1.yaml
: Added a new test case for a Pod with the corrected security context parameter.rules/set-sysctls-params/test/pod/expected.json
: Updated the expected test results to reflect the corrected security context parameter.rules/set-sysctls-params/test/pod/input/pod1.yaml
: Added a new test case for a Pod with the corrected security context parameter.rules/set-sysctls-params/test/workload/expected.json
: Updated the expected test results to reflect the corrected security context parameter.rules/set-sysctls-params/test/workload/input/deployment1.yaml
: Added a new test case for a Workload with the corrected security context parameter.User Description:
Overview
PR to fix typo systctls --> sysctls.
Fixes issue #500