Publicly accessible application with a critical vulnerability running on a privileged Kubernetes node

Set up the kubernetes integration.

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Description

Unpatched vulnerabilities in publicly accessible applications can increase the likelihood of exposing weaknesses, creating an entry point for attackers to gain unauthorized access to the pod or container. Granting excessive security capabilities to a pod or container allows unintended lateral movement to other containers or access to the underlying Kubernetes node. Assignment of the pod or container to a node with excessive permissions can increase the blast radius of potential unauthorized access to cloud resources.

Remediation

  1. Review any associated vulnerability references or advisories.
  2. Apply the appropriate patch based on remediation guidance. If no patch is available, apply compensating controls such as disabling or removing the vulnerable component.
  3. Review your Kubernetes pod or container security context configurations to ensure they provide proper isolation boundaries between containers and host resources.
  4. Apply possible mitigations, including the use of Kubernetes Pod Security Policies, SELinux, AppArmor, or Seccomp filters.
  5. Review the assigned cloud provider roles and permissions on the assigned node to ensure they are scoped to the principle of least privilege.
PREVIEWING: brett0000FF/node-compatibility