CCSS (Common Configuration Scoring System) is a set of measures used to determine the severity of the rule.
Each rule is associated with a high-level category. For example IAM, Container, Monitoring, Logging, Network, etc.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsAccess to a Docker host from the container can lead to container escape attacks and privilege escalation on the host.
Remove hostPath
volume mount.
Remove host_path.path
from the spec.volume
attribute.
resource "kubernetes_pod" "allowed" {
metadata {
name = "example-623a1"
}
spec {
volume {
name = "example-623a1"
}
container {
image = "nginx:1.7.9"
name = "example"
}
dns_config {
nameservers = ["1.1.1.1", "8.8.8.8", "9.9.9.9"]
searches = ["example.com"]
}
dns_policy = "None"
}
}