-
Notifications
You must be signed in to change notification settings - Fork 846
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kubescape Operator - Controls that require visibility of the nodes are missing in report (e.g., Worker Configuration Files and Kubelet) for CIS framework #1755
Comments
good catch, thanks |
@matthyx Can you confirm the following?
|
Hi @AdonisOkpidi, as for the host scan missing controls (point 1), in the initial scan of the operator it is not enabled, but for the recurring scans.
Please let us know if you have any other questions. |
@Bezbran Thanks for the reply. Regarding point 1, I will confirm this once I have been able to install as I am experiencing some issues. Point 3, is it possible this is moved to be controlled by Values.yaml, the reason is Security team would manage the Values.yaml and the Engineering teams would install and upgrade from kubescape remote repository. |
Hi @AdonisOkpidi , sure, let us know how is it going. Regarding point 3, I understand your use case. It's possible to make it configurable and I opened a ticket for it. |
Thanks a lot for this! @Bezbran |
QQ: You mentioned " the initial scan it scans for "allcontrols", "nsa" and "mitre" frameworks and at recurring scans it scans all FWs". So if kubescape was installed in GKE, would it scan using the |
Hi @AdonisOkpidi, |
Oh okay! Thanks for confirming this would be skipped by default @Bezbran |
Description
Deployed the Kubescape operator Helm chart with all capabilities enabled in the Helm values.yaml, including
nodeScan
variable for GKE. However, no related controls checks for Worker Configuration Files and Kubelet were found in the workload reports indicating host scans was not possible/configured?However, Using the CLI with
--enable-host-scan
scans all controls with noAction Required *
in the output and successfully provides all findings. I understand this is now deprecated so I would like to know how to make this work using the operator.Environment
Steps To Reproduce
helm upgrade --install kubescape /helm-charts/charts/kubescape-operator \ -n kubescape --create-namespace \ --set clusterName=$(kubectl config current-context) \ -f values.yaml
NB: Enable all capabilities in the Helm values.yaml, including
nodeScan
.Expected behavior
Host-related controls (e.g., Worker Configuration Files and Kubelet) should appear in the reports generated by the operator when all capabilities, including nodeScan, are enabled.
Can you filter to scan for only the framework cis-v1.23-t1.0.1 in the operator?
Actual Behavior
No host-related controls are included in the reports when using the operator.
Running the CLI with
--enable-host-scan
does successfully include these findings.Additional context
kubescape scan framework cis-v1.23-t1.0.1 --enable-host-scan --use-from regolibrary/offline/cis-v1.23-t1.0.1.json --verbose --controls-config regolibrary/controls-inputs.json
This command scans all controls, including host-related ones, because of the --enable-host-scan flag. However, this feature is deprecated, and findings are expected to be included in the operator's reports without relying on the CLI.
The text was updated successfully, but these errors were encountered: