-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SYS.1.6.A16 #16
Comments
|
Is this requirement to be implemented organizationally? |
the only thing I see, which could be checked is: But I do not see much value in it, since per default a pod wont be allowed to expose ports <1024 anyway because they need root permissions to do so (if my understanding is correct here). Someone who wants to expose SSH for example will do it on a custom port anyway (like 2222). So there is already a technical feature which contradicts the possible check. One COULD guess, which >1024 ports are commonly used, but this might trigger many false-positives and few true-positives |
I also see it mostly as an organizational implementation. Section 2 could be checked with SCC-rules such as Maybe we can also note, that container runtime security tools can detect, alert and remediate, if remote access daemon processes such as SSHd are running in a container. |
No description provided.
The text was updated successfully, but these errors were encountered: