turbot/kubernetes_compliance

Query: pod_security_policy_container_privilege_escalation_disabled

Usage

powerpipe query kubernetes_compliance.query.pod_security_policy_container_privilege_escalation_disabled

SQL

select
coalesce(uid, concat(path, ':', start_line)) as resource,
case
when not allow_privilege_escalation then 'ok'
else 'alarm'
end as status,
case
when not allow_privilege_escalation then 'Pod security policy ' || name || ' pods can not request to allow privilege escalation.'
else 'Pod security policy ' || name || ' pods can request to allow privilege escalation.'
end as reason,
coalesce(context_name, '') as context_name,
source_type,
coalesce(path || ':' || start_line || '-' || end_line, '') as path
from
kubernetes_pod_security_policy;

Controls

The query is being used by the following controls: