Skip to content

Commit

Permalink
bundles_sync/08_11_24
Browse files Browse the repository at this point in the history
  • Loading branch information
alphadev4 committed Nov 8, 2024
1 parent 981b0df commit 8107bd5
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion plugins/google/compute/instanceNetworkExposure.js
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ module.exports = {
instanceGroups.forEach(instanceGroup => {
let igForwardingRules = helpers.getForwardingRules(cache, source, region, instanceGroup);
forwardingRules = forwardingRules.concat(igForwardingRules);
})
});

}
let internetExposed = helpers.checkNetworkExposure(cache, source, networks, firewallRules, region, results, forwardingRules);
Expand Down
8 changes: 4 additions & 4 deletions plugins/google/kubernetes/clusterNetworkExposure.js
Original file line number Diff line number Diff line change
Expand Up @@ -7,9 +7,9 @@ module.exports = {
domain: 'Containers',
severity: 'Info',
description: 'Check if GKE clusters are exposed to the internet.',
"more_info": "GKE clusters exposed to the internet are at a higher risk of unauthorized access, data breaches, and cyberattacks. It’s crucial to limit exposure by securing the Kubernetes API, nodes, and services through proper configuration of network, firewall rules, and private clusters.",
"link": "https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters",
"recommended_action": "Secure GKE clusters by enabling private clusters, restricting access to the Kubernetes API, and ensuring nodes and services are protected through properly configured firewall rules and network policies.",
more_info: 'GKE clusters exposed to the internet are at a higher risk of unauthorized access, data breaches, and cyberattacks. It’s crucial to limit exposure by securing the Kubernetes API, nodes, and services through proper configuration of network, firewall rules, and private clusters.',
link: 'https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters',
recommended_action: 'Secure GKE clusters by enabling private clusters, restricting access to the Kubernetes API, and ensuring nodes and services are protected through properly configured firewall rules and network policies.',
apis: ['kubernetes:list', 'firewalls:list'],
realtime_triggers: ['container.ClusterManager.CreateCluster', 'container.ClusterManager.DeleteCluster','container.ClusterManager.UpdateCluster', 'container.ClusterManager.CreateNodePool','container.ClusterManager.DeleteNodePool',
'compute.firewalls.insert', 'compute.firewalls.delete', 'compute.firewalls.patch'],
Expand Down Expand Up @@ -81,7 +81,7 @@ module.exports = {
// check node pools
let exposedNodePools = cluster.nodePools.filter(nodepool => nodepool.networkConfig && !nodepool.networkConfig.enablePrivateNodes).map(nodepool => nodepool.name);
if (exposedNodePools.length) {
internetExposed = `node pools ${exposedNodePools.join(',')}`
internetExposed = `node pools ${exposedNodePools.join(',')}`;
}
}

Expand Down

0 comments on commit 8107bd5

Please sign in to comment.