Kubernetes
Kubernetes Inspection Items
| Category | Resource | Option | Item | Description | Risk Level | ISO27001 | CSAP | ISMS-P | Stability Assessment |
|---|---|---|---|---|---|---|---|---|---|
| Apps | Daemon Set, Deployment | Containers > Probe | Logging Monitoring | Liveness Probe Not Configured | MEDIUM | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Apps | Daemon Set, Deployment | Containers > Probe | Logging Monitoring | Readiness Probe Not Configured | MEDIUM | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Apps | Daemon Set, Deployment | Containers > Resources > Limits | Logging Monitoring | Resource Limits Not Configured | HIGH | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Apps | Daemon Set, Deployment | Containers > Resources > Requests | Logging Monitoring | Resource Requests Not Configured | HIGH | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Apps | Daemon Set, Deployment | Pod Security Context, Containers > Container Security Context | Access Control | Access Control Not Configured | HIGH | 8.1 Operational planning and control | 10.1.1. Access Control Policy Establishment | 2.6 Access Control | 7.1.1 Access Control Policy |
| Apps | Daemon Set, Deployment | Pod Security Context, Pod Security Context > Run As User | Access Control | Use of root user | HIGH | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Apps | Daemon Set, Deployment | Pod Security Context, Pod Security Context > Run As Non Root | Access Control | Use of root user | HIGH | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Apps | Daemon Set, Deployment | Containers > Container Security Context, Containers > Container Security Context > Run As User | Access Control | Use of root user | HIGH | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Apps | Daemon Set, Deployment | Containers > Container Security Context, Containers > Container Security Context > Run As Non Root | Access Control | Use of root user | HIGH | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Apps | Daemon Set, Deployment | Containers > Env > Value From Type | Data Protection | Use of Secret environment variables | CRITICAL | 8.1 Operational planning and control | 9.1.1. Virtual Resource Management | 2.10 System and Service Security Management | 8.1.1 Virtualization Security |
| Apps | Daemon Set, Deployment | Containers > Env From > Type | Data Protection | Use of Secret environment variables | CRITICAL | 8.1 Operational planning and control | 9.1.1. Virtual Resource Management | 2.10 System and Service Security Management | 8.1.1 Virtualization Security |
| Apps | Daemon Set, Deployment | Namespace | Data Protection | Use of default namespace | MEDIUM | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Apps | Daemon Set, Deployment | Containers > Image | Data Protection | Digest and tag not set | HIGH | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Apps | Stateful Set | Containers > Probe | Logging Monitoring | Liveness Probe Not Configured | MEDIUM | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Apps | Stateful Set | Containers > Probe | Logging Monitoring | Readiness Probe Not Configured | MEDIUM | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Apps | Stateful Set | Containers > Resources > Limits | Logging Monitoring | Resource Limits Not Configured | HIGH | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Apps | Stateful Set | Containers > Resources > Requests | Logging Monitoring | Resource Requests Not Configured | HIGH | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Apps | Stateful Set | Containers > Env > Value From Type | Data Protection | Use of Secret environment variables | CRITICAL | 8.1 Operational planning and control | 9.1.1. Virtual Resource Management | 2.10 System and Service Security Management | 8.1.1 Virtualization Security |
| Apps | Stateful Set | Containers > Env From > Type | Data Protection | Use of Secret environment variables | CRITICAL | 8.1 Operational planning and control | 9.1.1. Virtual Resource Management | 2.10 System and Service Security Management | 8.1.1 Virtualization Security |
| Apps | Stateful Set | Namespace | Data Protection | Use of default namespace | MEDIUM | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Apps | Stateful Set | Containers > Image | Data Protection | Digest and tag not set | HIGH | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Autoscaling | Horizontal Pod Autoscaler | Namespace | Data Protection | Use of default namespace | MEDIUM | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Batch | Cron Job, Job | Namespace | Data Protection | Use of default namespace | MEDIUM | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Core | Config Map, Persistent Volume Claim, Secret, Service | Namespace | Data Protection | Use of default namespace | MEDIUM | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Core | Pod | Containers > Probe | Logging Monitoring | Liveness Probe Not Configured | MEDIUM | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Core | Pod | Containers > Probe | Logging Monitoring | Readiness Probe Not Configured | MEDIUM | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Core | Pod | Containers > Resources > Limits | Logging Monitoring | Resource Limits Not Configured | HIGH | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Core | Pod | Containers > Resources > Requests | Logging Monitoring | Resource Requests Not Configured | HIGH | 8.1 Operational planning and control | 6.2.2. Redundancy and Backup | 2.9 System and Service Operation Management | 5.2.2 Service Availability |
| Core | Pod | Pod Security Context, Containers > Container Security Context | Access Control | Access Control Not Configured | HIGH | 8.1 Operational planning and control | 10.1.1. Access Control Policy Establishment | 2.6 Access Control | 7.1.1 Access Control Policy |
| Core | Pod | Pod Security Context, Pod Security Context > Run As User | Access Control | Use of root user | HIGH | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Core | Pod | Pod Security Context, Pod Security Context > Run As Non Root | Access Control | Use of root user | HIGH | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Core | Pod | Containers > Container Security Context, Containers > Container Security Context > Run As User | Access Control | Use of root user | HIGH | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Core | Pod | Containers > Container Security Context, Containers > Container Security Context > Run As Non Root | Access Control | Use of root user | HIGH | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Core | Pod | Containers > Env > Value From Type | Data Protection | Use of Secret environment variables | CRITICAL | 8.1 Operational planning and control | 9.1.1. Virtual Resource Management | 2.10 System and Service Security Management | 8.1.1 Virtualization Security |
| Core | Pod | Containers > Env From > Type | Data Protection | Use of Secret environment variables | CRITICAL | 8.1 Operational planning and control | 9.1.1. Virtual Resource Management | 2.10 System and Service Security Management | 8.1.1 Virtualization Security |
| Core | Pod | Namespace | Data Protection | Use of default namespace | MEDIUM | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Core | Pod | Containers > Image | Data Protection | Digest and tag not set | HIGH | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Core | Service Account | Automount Service Account Token | Access Control | Token automatic mount setting | HIGH | 8.1 Operational planning and control | 10.1.1. Access Control Policy Establishment | 2.6 Access Control | 7.1.1 Access Control Policy |
| Core | Service Account | Namespace | Data Protection | Use of default namespace | MEDIUM | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Helm | Chart | Namespace | Data Protection | Use of default namespace | MEDIUM | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Networking | Ingress, Network Policy | Namespace | Data Protection | Use of default namespace | MEDIUM | 8.1 Operational planning and control | 12.1.4. Data Protection | 2.9 System and Service Operation Management | 10.1.4 Data Protection |
| Rbac | Cluster Role | Rule > Rule Type, Rule > Api Groups | Access Control | Wide range of permissions settings | CRITICAL | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Rbac | Cluster Role | Rule > Rule Type, Rule > Resources | Access Control | Wide range of permissions settings | CRITICAL | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Rbac | Cluster Role | Rule > Rule Type, Rule > Verbs | Access Control | Wide range of permissions settings | CRITICAL | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Rbac | Cluster Role | Rule > Rule Type, Rule > Verbs | Access Control | Wide range of permissions settings | CRITICAL | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Rbac | Cluster Role Binding | Subject, Subject > Kind | Access Control | Assign roles to the default service account | HIGH | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Rbac | Role | Rule > Api Groups | Access Control | Wide range of permissions settings | CRITICAL | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Rbac | Role | Rule > Resources | Access Control | Wide range of permissions settings | CRITICAL | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Rbac | Role | Rule > Verbs | Access Control | Wide range of permissions settings | CRITICAL | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |
| Rbac | Role Binding | Subject, Subject > Kind | Access Control | Assign roles to the default service account | HIGH | 8.1 Operational planning and control | 10.2.1. User Registration and Authorization | 2.5 Authentication and Authorization Management | 7.2.2 Access Rights Management |