Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

lacework-agent uses default service account by default #105

Open
joebowbeer opened this issue Sep 19, 2022 · 2 comments
Open

lacework-agent uses default service account by default #105

joebowbeer opened this issue Sep 19, 2022 · 2 comments

Comments

@joebowbeer
Copy link

By default, Lacework uses the default service account, which is something that CIS Benchmark recommends against:

Create explicit service accounts wherever a Kubernetes workload requires specific access to the Kubernetes API server.

I noticed that a serviceAccountName has been added to laceworkConfig. However, this appears to be specific to OpenShift, and assigning a value to this will not create a ServiceAccount resource with this name.

@cirego
Copy link
Contributor

cirego commented Sep 19, 2022

Hi @joebowbeer, thanks for raising this. By default, the Lacework agent does not access the Kubernetes API server.

However, we do have a feature in preview where a Lacework workload will access the Kubernetes API server. If that feature is enabled in the Helm Charts, then the charts will create a service account for the workload that is accessing the API server. I believe we are already addressing your concern.

Does this make sense and does this satisfy your concern?

@joebowbeer
Copy link
Author

joebowbeer commented Sep 19, 2022

Thanks for clarification.

Because Lacework is not naming its own service account, it is using the default one.

I think it would be better to be explicit and create a dedicated one. That would bring Lacework into compliance with the CIS Benchmark recommendation which states:

Ensure that default service accounts are not actively used

By the way, why is automountServiceAcountToken not disabled for the default service account in the lacework namespace? If the lacework daemonset is going to use the default service account but not use the k8s API, then I suggest disabling automountServiceAcountToken.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants