Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

disallow hostPort #504

Open
1 of 3 tasks
dani-santos-code opened this issue Nov 22, 2022 · 0 comments
Open
1 of 3 tasks

disallow hostPort #504

dani-santos-code opened this issue Nov 22, 2022 · 0 comments

Comments

@dani-santos-code
Copy link
Contributor

Going through Kubernetes pod security standards, it'd be important to have an auditor to catch allowed hostPorts. Could this be added to the hostns auditor?

HostPorts should be disallowed, or at minimum restricted to a known list.

Restricted Fields

- spec.containers[*].ports[*].hostPort
- spec.initContainers[*].ports[*].hostPort
- spec.ephemeralContainers[*].ports[*].hostPort

Allowed Values

- Undefined/nil
- Known list
- 0
ISSUE TYPE
  • Bug Report
  • Feature Idea
SUMMARY

follow best practices and keep kubeaudit scans/audits up to date

FEATURE IDEA

  • If the maintainers agree with the feature as described here, I intend to submit a Pull Request myself.1

Proposal:

1 This is the quickest way to get a new feature! We reserve the right to close feature requests, even ones we like, if the proposer does not intend to contribute to the feature and it doesn't fit in our current roadmap.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant