Use only AuditScanner as a CIS-compliance control #2142
Unanswered
kapistka
asked this question in
Help & Support
Replies: 2 comments 1 reply
-
@kapistka the reports are generate in the namespaces where resources exist, for example a workload which has been deployed to namespace the crds are deployed by default, by setting the param you mention above it disable scanners
|
Beta Was this translation helpful? Give feedback.
0 replies
-
1, 2 We have decided on the optimal settings for us.
There is no workloads checking here (CIS ids 5.X), but we control it through the Policy Engine.
|
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We plan to use only the compliance report, scan periodically and collect the result in metrics. Thus, we want to control the change of some cluster security settings. At the same time, we don't need other functionality and other reports (CRD).
It seems that only
configAuditScannerEnabled: true
will not be enough, since not all CIS checks will be performed. That's why trivy-operator was deploy like this:After that we get the expected CIS-result: 21 fail/95 pass.
But there are questions.
targetNamespaces
), the result became 0/116. But after returning to the original settings, the result became 14/102 instead of 21/95 (5.x ids only). Nothing changed in the cluster and every changing the operator settings was accompanied by a pod restart. It seems that CIS checks give an unstable result.trivy-operator: 0.21.1
helm-chart: trivy-operator-0.23.1
k8s: v1.29.4
ArgoCD: v2.11.2
Beta Was this translation helpful? Give feedback.
All reactions