@@ -77,23 +77,22 @@ To configure the recommendations, install the **Azure Policy add-on for Kuberne
77
77
78
78
| Recommendation name | Security control | Configuration required |
79
79
| -----------------------------------------------------------------------------| ------------------------------------------| ------------------------|
80
+ | Container CPU and memory limits should be enforced | Protect applications against DDoS attack | ** Yes** |
81
+ | Container images should be deployed only from trusted registries | Remediate vulnerabilities | ** Yes** |
80
82
| Containers should listen on allowed ports only | Restrict unauthorized network access | ** Yes** |
83
+ | Least privileged Linux capabilities should be enforced for containers | Manage access and permissions | ** Yes** |
84
+ | Overriding or disabling of containers AppArmor profile should be restricted | Remediate security configurations | ** Yes** |
81
85
| Services should listen on allowed ports only | Restrict unauthorized network access | ** Yes** |
82
86
| Usage of host networking and ports should be restricted | Restrict unauthorized network access | ** Yes** |
83
- | Overriding or disabling of containers AppArmor profile should be restricted | Remediate security configurations | ** Yes** |
84
- | Container images should be deployed only from trusted registries | Remediate vulnerabilities | ** Yes** |
85
- | Least privileged Linux capabilities should be enforced for containers | Manage access and permissions | ** Yes** |
86
87
| Usage of pod HostPath volume mounts should be restricted to a known list | Manage access and permissions | ** Yes** |
87
- | Privileged containers should be avoided | Manage access and permissions | No |
88
88
| Container with privilege escalation should be avoided | Manage access and permissions | No |
89
- | Kubernetes clusters should disable automounting API credentials | Manage access and permissions | No |
90
- | Immutable (read-only) root filesystem should be enforced for containers | Manage access and permissions | No |
91
- | Container with privilege escalation should be avoided | Manage access and permissions | No |
92
- | Running containers as root user should be avoided | Manage access and permissions | No |
93
89
| Containers sharing sensitive host namespaces should be avoided | Manage access and permissions | No |
94
- | Container CPU and memory limits should be enforced | Protect applications against DDoS attack | No |
90
+ | Immutable (read-only) root filesystem should be enforced for containers | Manage access and permissions | No |
95
91
| Kubernetes clusters should be accessible only over HTTPS | Encrypt data in transit | No |
92
+ | Kubernetes clusters should disable automounting API credentials | Manage access and permissions | No |
96
93
| Kubernetes clusters should not use the default namespace | Implement security best practices | No |
94
+ | Privileged containers should be avoided | Manage access and permissions | No |
95
+ | Running containers as root user should be avoided | Manage access and permissions | No |
97
96
||||
98
97
99
98
0 commit comments