Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[datagov-brokerpak-eks] 2048.yml vulnerabilities #4097

Closed
6 tasks
nickumia-reisys opened this issue Dec 6, 2022 · 2 comments
Closed
6 tasks

[datagov-brokerpak-eks] 2048.yml vulnerabilities #4097

nickumia-reisys opened this issue Dec 6, 2022 · 2 comments
Labels
bug Software defect or bug compliance Relating to security compliance or documentation

Comments

@nickumia-reisys
Copy link
Contributor

nickumia-reisys commented Dec 6, 2022

Date of report: 12/06/2022
Severity: Moderate and Low (not active in production)

Due date is based on severity and described in RA-5. 15-days for Critical, 30-days for High, and 90-days for Moderate and lower.

  • Container is running without root user control (Moderate)
    • Detailed paths
    • This issue is...
      • Container is running without root user control
    • The impact of this is...
      • Container could be running with full administrative privileges
    • You can resolve it by...
      • Set securityContext.runAsNonRoot to true
  • Container does not drop all default capabilities (Moderate)
    • Detailed paths
      • Introduced through: [DocId: 0] › input › spec › template › spec › containers[app-2048] › securityContext › capabilities › drop
    • This issue is...
      • All default capabilities are not explicitly dropped
    • The impact of this is...
      • Containers are running with potentially unnecessary privileges
    • You can resolve it by...
      • Add ALL to securityContext.capabilities.drop list, and add only required capabilities in securityContext.capabilities.add
  • Container is running without liveness probe (Low)
    • Detailed paths
      • Introduced through: [DocId: 0] › spec › template › spec › containers[app-2048] › livenessProbe
    • This issue is...
      • Liveness probe is not defined
    • The impact of this is...
      • Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods
    • You can resolve it by...
      • Add livenessProbe attribute
  • Container is running with writable root filesystem (Low)
    • Detailed paths
      • Introduced through: [DocId: 0] › input › spec › template › spec › containers[app-2048] › securityContext › readOnlyRootFilesystem
      • This issue is...
        • readOnlyRootFilesystem attribute is not set to true
      • The impact of this is...
        • Compromised process could abuse writable root filesystem to elevate privileges
      • You can resolve it by...
        • Set securityContext.readOnlyRootFilesystemtotrue`
  • Container has no CPU limit (Low)
    • Detailed paths
      • Introduced through: [DocId: 0] › input › spec › template › spec › containers[app-2048] › resources › limits › cpu
    • This issue is...
      • Container has no CPU limit
    • The impact of this is...
      • CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.
    • You can resolve it by...
      • Add resources.limits.cpu field with required CPU limit value
  • Container is running without memory limit (Low)
    • Detailed paths
    • Introduced through: [DocId: 0] › input › spec › template › spec › containers[app-2048] › resources › limits › memory
    • This issue is...
      • Memory limit is not defined
    • The impact of this is...
      • Containers without memory limits are more likely to be terminated when the node runs out of memory
    • You can resolve it by...
      • Set resources.limits.memory value
@nickumia-reisys nickumia-reisys added compliance Relating to security compliance or documentation bug Software defect or bug labels Dec 6, 2022
@nickumia-reisys
Copy link
Contributor Author

This is important to complete, but does not affect anything in production (even when fixed).

@nickumia-reisys nickumia-reisys changed the title [datagov-brokerpak-eks] Container is running without root user control [datagov-brokerpak-eks] 2048.yml vulnerabilities Dec 6, 2022
@nickumia-reisys
Copy link
Contributor Author

Re-issued in eks-brokerpak repo

@nickumia-reisys nickumia-reisys moved this to ✔ Done in data.gov team board Dec 7, 2022
@hkdctol hkdctol moved this from ✔ Done to 🗄 Closed in data.gov team board May 30, 2023
@btylerburton btylerburton reopened this Sep 3, 2024
@github-project-automation github-project-automation bot moved this from 🗄 Closed to 📟 Sprint Backlog [7] in data.gov team board Sep 3, 2024
@github-project-automation github-project-automation bot moved this from 📟 Sprint Backlog [7] to ✔ Done in data.gov team board Sep 3, 2024
@btylerburton btylerburton moved this from ✔ Done to 🗄 Closed in data.gov team board Sep 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Software defect or bug compliance Relating to security compliance or documentation
Projects
Archived in project
Development

No branches or pull requests

2 participants