You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Firstly, thanks so much for making these charts available, and for making them so configurable and easy to use!
I've deployed this chart onto a home server and run Trivy configuration audits, and found a few problems:
Replica set:
Name: replicaset-minecraft-minecraft-f9b4c8777Report:
Checks:
Category: Kubernetes Security CheckCheck ID: KSV001Description: A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.Messages:
Container 'minecraft-minecraft' of ReplicaSet 'minecraft-minecraft-f9b4c8777' should set 'securityContext.allowPrivilegeEscalation' to falseRemediation: Set 'set containers[].securityContext.allowPrivilegeEscalation' to 'false'.Severity: MEDIUMSuccess: falseTitle: Can elevate its own privilegesCategory: Kubernetes Security CheckCheck ID: KSV003Description: The container should drop all default capabilities and add only those that are needed for its execution.Messages:
Container 'minecraft-minecraft' of ReplicaSet 'minecraft-minecraft-f9b4c8777' should add 'ALL' to 'securityContext.capabilities.drop'Remediation: Add 'ALL' to containers[].securityContext.capabilities.drop.Severity: LOWSuccess: falseTitle: Default capabilities: some containers do not drop allCategory: Kubernetes Security CheckCheck ID: KSV004Description: Security best practices require containers to run with minimal required capabilities.Messages:
Container 'minecraft-minecraft' of 'replicaset' 'minecraft-minecraft-f9b4c8777' in 'minecraft' namespace should set securityContext.capabilities.dropRemediation: Specify at least one unneeded capability in 'containers[].securityContext.capabilities.drop'Severity: LOWSuccess: falseTitle: Default capabilities: some containers do not drop anyCategory: Kubernetes Security CheckCheck ID: KSV012Description: Force the running image to run as a non-root user to ensure least privileges.Messages:
Container 'minecraft-minecraft' of ReplicaSet 'minecraft-minecraft-f9b4c8777' should set 'securityContext.runAsNonRoot' to trueRemediation: Set 'containers[].securityContext.runAsNonRoot' to true.Severity: MEDIUMSuccess: falseTitle: Runs as root userCategory: Kubernetes Security CheckCheck ID: KSV013Description: It is best to avoid using the ':latest' image tag when deploying containers in production. Doing so makes it hard to track which version of the image is running, and hard to roll back the version.Messages:
Container 'minecraft-minecraft' of ReplicaSet 'minecraft-minecraft-f9b4c8777' should specify an image tagRemediation: Use a specific container image tag that is not 'latest'.Severity: MEDIUMSuccess: falseTitle: Image tag ":latest" usedCategory: Kubernetes Security CheckCheck ID: KSV014Description: An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.Messages:
Container 'minecraft-minecraft' of ReplicaSet 'minecraft-minecraft-f9b4c8777' should set 'securityContext.readOnlyRootFilesystem' to trueRemediation: Change 'containers[].securityContext.readOnlyRootFilesystem' to 'true'.Severity: HIGHSuccess: falseTitle: Root file system is not read-onlyCategory: Kubernetes Security CheckCheck ID: KSV020Description: Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.Messages:
Container 'minecraft-minecraft' of ReplicaSet 'minecraft-minecraft-f9b4c8777' should set 'securityContext.runAsUser' > 10000Remediation: Set 'containers[].securityContext.runAsUser' to an integer > 10000.Severity: LOWSuccess: falseTitle: Runs with UID <= 10000Category: Kubernetes Security CheckCheck ID: KSV021Description: Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.Messages:
Container 'minecraft-minecraft' of ReplicaSet 'minecraft-minecraft-f9b4c8777' should set 'securityContext.runAsGroup' > 10000Remediation: Set 'containers[].securityContext.runAsGroup' to an integer > 10000.Severity: LOWSuccess: falseTitle: Runs with GID <= 10000Category: Kubernetes Security CheckCheck ID: KSV030Description: According to pod security standard 'Seccomp', the RuntimeDefault seccomp profile must be required, or allow specific additional profiles.Messages:
Either Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault'Remediation: Set 'spec.securityContext.seccompProfile.type', 'spec.containers[*].securityContext.seccompProfile' and 'spec.initContainers[*].securityContext.seccompProfile' to 'RuntimeDefault' or undefined.Severity: LOWSuccess: falseTitle: Runtime/Default Seccomp profile not setCategory: Kubernetes Security CheckCheck ID: KSV032Description: Containers should only use images from trusted registries.Messages:
container minecraft-minecraft of replicaset minecraft-minecraft-f9b4c8777 in minecraft namespace should restrict container image to your specific registry domain. For Azure any domain ending in 'azurecr.io'Remediation: Use images from trusted Azure registries.Severity: MEDIUMSuccess: falseTitle: All container images must start with the *.azurecr.io domainCategory: Kubernetes Security CheckCheck ID: KSV033Description: Containers should only use images from trusted GCR registries.Messages:
container minecraft-minecraft of replicaset minecraft-minecraft-f9b4c8777 in minecraft namespace should restrict container image to your specific registry domain. See the full GCR list here: https://cloud.google.com/container-registry/docs/overview#registriesRemediation: Use images from trusted GCR registries.Severity: MEDIUMSuccess: falseTitle: All container images must start with a GCR domainCategory: Kubernetes Security CheckCheck ID: KSV034Description: Container images must not start with an empty prefix or a defined public registry domain.Messages:
Container 'minecraft-minecraft' of ReplicaSet 'minecraft-minecraft-f9b4c8777' should restrict container image to use private registriesRemediation: Use images from private registries.Severity: MEDIUMSuccess: falseTitle: Container images from public registries usedCategory: Kubernetes Security CheckCheck ID: KSV035Description: Container images from non-ECR registries should be forbidden.Messages:
Container 'minecraft-minecraft' of ReplicaSet 'minecraft-minecraft-f9b4c8777' should restrict images to own ECR repository. See the full ECR list here: https://docs.aws.amazon.com/general/latest/gr/ecr.htmlRemediation: Container image should be used from Amazon container RegistrySeverity: MEDIUMSuccess: falseTitle: All container images must start with an ECR domainCategory: Kubernetes Security CheckCheck ID: KSV039Description: ensure limit range policy has configure in order to limit resource usage for namespaces or nodesMessages:
limit range policy with a default request and limit, min and max request, for each container should be configureRemediation: create limit range policy with a default request and limit, min and max request, for each container.Severity: LOWSuccess: falseTitle: limit range usageCategory: Kubernetes Security CheckCheck ID: KSV040Description: ensure resource quota policy has configure in order to limit aggregate resource usage within namespaceMessages:
resource quota policy with hard memory and cpu quota per namespace should be configureRemediation: create resource quota policy with mem and cpu quota per each namespaceSeverity: LOWSuccess: falseTitle: resource quota usageCategory: Kubernetes Security CheckCheck ID: KSV104Description: A program inside the container can bypass Seccomp protection policies.Messages:
container "minecraft-minecraft" of replicaset "minecraft-minecraft-f9b4c8777" in "minecraft" namespace should specify a seccomp profileRemediation: Specify seccomp either by annotation or by seccomp profile type having allowed values as per pod security standardsSeverity: MEDIUMSuccess: falseTitle: Seccomp policies disabledCategory: Kubernetes Security CheckCheck ID: KSV106Description: Containers must drop ALL capabilities, and are only permitted to add back the NET_BIND_SERVICE capability.Messages:
container should drop allRemediation: Set 'spec.containers[*].securityContext.capabilities.drop' to 'ALL' and only add 'NET_BIND_SERVICE' to 'spec.containers[*].securityContext.capabilities.add'.Severity: LOWSuccess: falseTitle: Container capabilities must only include NET_BIND_SERVICEScanner:
Name: TrivyVendor: Aqua SecurityVersion: 0.22.0Summary:
Critical Count: 0High Count: 1Low Count: 8Medium Count: 8
Service:
Name: service-minecraft-minecraftReport:
Checks:
Category: Kubernetes Security CheckCheck ID: KSV039Description: ensure limit range policy has configure in order to limit resource usage for namespaces or nodesMessages:
limit range policy with a default request and limit, min and max request, for each container should be configureRemediation: create limit range policy with a default request and limit, min and max request, for each container.Severity: LOWSuccess: falseTitle: limit range usageCategory: Kubernetes Security CheckCheck ID: KSV040Description: ensure resource quota policy has configure in order to limit aggregate resource usage within namespaceMessages:
resource quota policy with hard memory and cpu quota per namespace should be configureRemediation: create resource quota policy with mem and cpu quota per each namespaceSeverity: LOWSuccess: falseTitle: resource quota usageScanner:
Name: TrivyVendor: Aqua SecurityVersion: 0.22.0Summary:
Critical Count: 0High Count: 0Low Count: 2Medium Count: 0
The text was updated successfully, but these errors were encountered:
Thanks but that was too much to read. I don't actively make changes to these charts anymore myself so you're welcome to submit a PR to fix what can be fixed.
For the first one you can already set the value podSecurityContext to whatever it needs to be, such as their recommended solution.
Hi 👋
Firstly, thanks so much for making these charts available, and for making them so configurable and easy to use!
I've deployed this chart onto a home server and run Trivy configuration audits, and found a few problems:
Replica set:
Service:
The text was updated successfully, but these errors were encountered: