Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Workload is exposed through an ingress policy (medium risk) #25

Open
avik-so opened this issue Jun 9, 2020 · 4 comments
Open

Workload is exposed through an ingress policy (medium risk) #25

avik-so opened this issue Jun 9, 2020 · 4 comments

Comments

@avik-so
Copy link

avik-so commented Jun 9, 2020

Is there a way to tell kube-scan that this is intentional?
Also, what is the suggested fix here if you want your service to be accessible from the internet?

@thehh1974
Copy link
Contributor

There isn't a way to mark external exposure as intentional. While it may not be a misconfiguration, it adds risk of compromise of that workload.
Possible mitigation include:

  • Reducing the container capabilities of the exposed workload.
  • Creating network policies which limit outbound traffic from that workload only to other services it needs to access
  • Avoiding mount of a service account token in that workload.

@avik-so
Copy link
Author

avik-so commented Jun 14, 2020

The result of this is developers ignoring the warning in other cases when it is not intentional.
Sounds like those mitigations would still cause the warning to be reported?

@thehh1974
Copy link
Contributor

We are working on taking into account mitigations when calculating the risk score.
It will not cause exposure not to be reported though.
The way to express intent is via policy, which at this time, is only supported in our (Octarine) enterprise product.

@avik-so
Copy link
Author

avik-so commented Jul 2, 2020

Thanks for your response. A lower score would be very helpful. You can close this issue, in the chance that you want to use this issue for that feature you are working on, I'm not closing it myself.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants