turbot/kubernetes_compliance

Query: replicaset_default_seccomp_profile_enabled

Usage

powerpipe query kubernetes_compliance.query.replicaset_default_seccomp_profile_enabled

Steampipe Tables

SQL

select
distinct(coalesce(uid, concat(path, ':', start_line))) as resource,
case
when c -> 'securityContext' -> 'seccompProfile' ->> 'type' = 'RuntimeDefault' then 'ok'
else 'alarm'
end as status,
case
when c -> 'securityContext' -> 'seccompProfile' ->> 'type' = 'RuntimeDefault' then name || ' seccompProfile enabled.'
else name || ' seccompProfile disabled.'
end as reason,
name as replicaset_name,
coalesce(context_name, '') as context_name,
namespace,
source_type,
coalesce(path || ':' || start_line || '-' || end_line, '') as path
from
kubernetes_replicaset,
jsonb_array_elements(template -> 'spec' -> 'containers') as c;

Controls

The query is being used by the following controls: