regolibrary
regolibrary copied to clipboard
The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.
ARMO rego library
Kubescape rego library for detecting miss-configurations in Kubernetes manifests
NSA Framework
MITRE ATT&CK® Framework
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Impact |
---|---|---|---|---|---|---|---|---|---|
Using Cloud credentials | Exec into container | Backdoor container | Privileged container | Clear container logs | List k8s secrets | Access the K8S API server | Access cloud resources | Image from private registry | Data Destruction |
Compromised Image in registry | bash/cmd inside container | Writable hostPath mount | Cluster-admin binding | Delete K8S events | Mount service principal | Access Kubelet API | Container service account | Resources Hijacking | |
kubeconfig file | New container | kubernetes CronJob | hostPath mount | Pod/Container name similarity | Access container service account | Network mapping | Cluster internal networking | Denial of service | |
Application vulnerability | Application Exploit (RCE) | Malicious admission controller | Access cloud resources | Connect from Proxy server | Application credentials in configuration files | Access kubernetes dashboard | Application credentials in configuration | ||
Exposed Dashboard | SSH server running insider container | Access managed identity credentials | instance Metadata API | Writable volume mounts on the host | |||||
Exposed sensitive interface | Sidecar injection | Malicious admission controller | Access kubernetes dashboard | ||||||
access tiller endpoint | |||||||||
CoreDNS poisoning | |||||||||
ARP and IP spoofing |