-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
Priority: HIGH
Description
No pod security policies are configured, and 6/8 services run without security contexts. This allows containers to run as root and with unnecessary capabilities.
Impact
- Containers running as root increase attack surface
- No resource limits could lead to DoS
- Missing security controls for compliance
Required Actions
- Add securityContext to all deployments:
- runAsNonRoot: true
- runAsUser: 1000
- readOnlyRootFilesystem: true where possible
- Set resource limits on all containers
- Enable Pod Security Standards at namespace level
- Add readiness and liveness probes
Acceptance Criteria
- All containers run as non-root
- Resource limits defined for CPU and memory
- Pod Security Standards enforced
- Health probes configured
References
- CIS Kubernetes Benchmark 5.3.2
- Original finding in SECURITY-REVIEW.md
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels