turbot/azure_compliance

Control: Kubernetes cluster pods should only use approved host network and port range

Description

Restrict pod access to the host network and the allowable host port range in a Kubernetes cluster. This recommendation is part of CIS 5.2.4 which is intended to improve the security of your Kubernetes environments. This policy is generally available for Kubernetes Service (AKS), and preview for Azure Arc enabled Kubernetes. For more information, see https://aka.ms/kubepolicydoc.

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.kubernetes_cluster_pod_use_approved_host_network_and_port_range

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.kubernetes_cluster_pod_use_approved_host_network_and_port_range --share

SQL

This control uses a named query:

manual_control

Tags