turbot/azure_compliance

Control: Kubernetes cluster containers should run with a read only root file system

Description

Run containers with a read only root file system to protect from changes at run-time with malicious binaries being added to PATH in a Kubernetes cluster. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.kubernetes_cluster_container_with_read_only_root_file_system

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.kubernetes_cluster_container_with_read_only_root_file_system --share

SQL

This control uses a named query:

manual_control

Tags