Kubernetes Security Assessment Report

Cluster: dev-sec-burpsuite  |  Kubernetes: 1.33  |  Scanned: 2026-05-20 18:30:06 UTC  |  Total Findings: 466

🛡 OWASP Kubernetes Top 10

Assessment based on the OWASP Kubernetes Top Ten framework  |  17 findings, 191 affected resources
81
Critical
25
Critical
1
High
151
Medium
10
Info
4
Pass
CategoryRiskFindingsWorst Severity
K01Insecure Workload Configurations123 issue(s) / 4 finding(s)CRITICAL
K02Overly Permissive RBAC1 issue(s) / 1 finding(s)HIGH
K03Secrets Management Failures10 issue(s) / 3 finding(s)MEDIUM
K04Lack of Centralized Policy Enforcement16 issue(s) / 2 finding(s)CRITICAL
K05Missing Network Segmentation0 issue(s) / 1 finding(s)PASS
K06Overly Exposed Cluster Components3 issue(s) / 2 finding(s)MEDIUM
K07Misconfigured Cluster Components0 issue(s) / 0 finding(s)PASS
K08Cluster-to-Cloud Lateral Movement6 issue(s) / 1 finding(s)MEDIUM
K09Broken Authentication Mechanisms18 issue(s) / 2 finding(s)MEDIUM
K10Inadequate Logging and Monitoring0 issue(s) / 1 finding(s)PASS

K01: Insecure Workload Configurations

123 issue(s) / 4 finding(s)
CRITICALHost Path Mounts
9 pods mount host paths
Affected Resources
  • fluent-bit/dev-fluent-bit-4kzmb -> /var/log
  • fluent-bit/dev-fluent-bit-9wqsp -> /var/log
  • fluent-bit/dev-fluent-bit-dv8cq -> /var/log
  • fluent-bit/dev-fluent-bit-fndxz -> /var/log
  • fluent-bit/dev-fluent-bit-kbpxk -> /var/log
  • fluent-bit/dev-fluent-bit-lb5j9 -> /var/log
  • fluent-bit/dev-fluent-bit-s82rz -> /var/log
  • fluent-bit/dev-fluent-bit-vfs2w -> /var/log
  • fluent-bit/dev-fluent-bit-zl6fh -> /var/log
MEDIUMMissing readOnlyRootFilesystem
46 containers lack readOnlyRootFilesystem: true
Affected Resources
  • clamav/dev-clamav-7f99944445-sm6jh/clamd
  • clamav/dev-clamav-7f99944445-sm6jh/freshclam-init
  • fluent-bit/dev-fluent-bit-4kzmb/fluent-bit
  • fluent-bit/dev-fluent-bit-4kzmb/nats-publisher
  • fluent-bit/dev-fluent-bit-9wqsp/fluent-bit
  • fluent-bit/dev-fluent-bit-9wqsp/nats-publisher
  • fluent-bit/dev-fluent-bit-dv8cq/fluent-bit
  • fluent-bit/dev-fluent-bit-dv8cq/nats-publisher
  • fluent-bit/dev-fluent-bit-fndxz/fluent-bit
  • fluent-bit/dev-fluent-bit-fndxz/nats-publisher
  • fluent-bit/dev-fluent-bit-kbpxk/fluent-bit
  • fluent-bit/dev-fluent-bit-kbpxk/nats-publisher
  • fluent-bit/dev-fluent-bit-lb5j9/fluent-bit
  • fluent-bit/dev-fluent-bit-lb5j9/nats-publisher
  • fluent-bit/dev-fluent-bit-s82rz/fluent-bit
  • fluent-bit/dev-fluent-bit-s82rz/nats-publisher
  • fluent-bit/dev-fluent-bit-vfs2w/fluent-bit
  • fluent-bit/dev-fluent-bit-vfs2w/nats-publisher
  • fluent-bit/dev-fluent-bit-zl6fh/fluent-bit
  • fluent-bit/dev-fluent-bit-zl6fh/nats-publisher
MEDIUMMissing runAsNonRoot
45 containers lack runAsNonRoot: true
Affected Resources
  • clamav/dev-clamav-7f99944445-sm6jh/clamd
  • clamav/dev-clamav-7f99944445-sm6jh/freshclam-init
  • cnpg/cnpg-operator-cloudnative-pg-6b8754bf9b-2zr97/manager
  • fluent-bit/dev-fluent-bit-4kzmb/fluent-bit
  • fluent-bit/dev-fluent-bit-4kzmb/nats-publisher
  • fluent-bit/dev-fluent-bit-9wqsp/fluent-bit
  • fluent-bit/dev-fluent-bit-9wqsp/nats-publisher
  • fluent-bit/dev-fluent-bit-dv8cq/fluent-bit
  • fluent-bit/dev-fluent-bit-dv8cq/nats-publisher
  • fluent-bit/dev-fluent-bit-fndxz/fluent-bit
  • fluent-bit/dev-fluent-bit-fndxz/nats-publisher
  • fluent-bit/dev-fluent-bit-kbpxk/fluent-bit
  • fluent-bit/dev-fluent-bit-kbpxk/nats-publisher
  • fluent-bit/dev-fluent-bit-lb5j9/fluent-bit
  • fluent-bit/dev-fluent-bit-lb5j9/nats-publisher
  • fluent-bit/dev-fluent-bit-s82rz/fluent-bit
  • fluent-bit/dev-fluent-bit-s82rz/nats-publisher
  • fluent-bit/dev-fluent-bit-vfs2w/fluent-bit
  • fluent-bit/dev-fluent-bit-vfs2w/nats-publisher
  • fluent-bit/dev-fluent-bit-zl6fh/fluent-bit
MEDIUMMissing Resource Limits
23 containers have no resource limits/requests
Affected Resources
  • cnpg/cnpg-operator-cloudnative-pg-6b8754bf9b-2zr97/manager
  • external-dns/external-dns-6cbf69b969-658w4/external-dns
  • fluent-bit/dev-fluent-bit-4kzmb/fluent-bit
  • fluent-bit/dev-fluent-bit-9wqsp/fluent-bit
  • fluent-bit/dev-fluent-bit-dv8cq/fluent-bit
  • fluent-bit/dev-fluent-bit-fndxz/fluent-bit
  • fluent-bit/dev-fluent-bit-kbpxk/fluent-bit
  • fluent-bit/dev-fluent-bit-lb5j9/fluent-bit
  • fluent-bit/dev-fluent-bit-s82rz/fluent-bit
  • fluent-bit/dev-fluent-bit-vfs2w/fluent-bit
  • fluent-bit/dev-fluent-bit-zl6fh/fluent-bit
  • grafana/dev-grafana-5dbcfccc84-zm5jp/grafana-sc-dashboard
  • grafana/dev-grafana-5dbcfccc84-zm5jp/grafana-sc-datasources
  • grafana/dev-grafana-prometheus-server-755f57f586-8lfd7/prometheus-server-configmap-reload
  • nats/dev-nats-0/reloader
  • nats/dev-nats-1/reloader
  • nats/dev-nats-2/reloader
  • nats/dev-nats-box-5dbd879cd9-b8g5q/nats-box
  • nats/dev-nats-tower-0/setup-ca-trust
  • nats/dev-nats-tower-stream-init-sq66f/setup-ca-trust

K02: Overly Permissive RBAC

1 issue(s) / 1 finding(s)
HIGHCluster-Admin Bindings
1 bindings grant cluster-admin or equivalent
Affected Resources
  • cluster-admin -> Group/system:masters

K03: Secrets Management Failures

10 issue(s) / 3 finding(s)
MEDIUMCloud Provider Credentials in Secrets
10 secrets appear to contain cloud credentials
Affected Resources
  • argo-cd/argocd-repo-creds-ssh-creds
  • burpsuite/burpsuite-db-cnpg-backup-creds
  • cert-manager/rt53-creds
  • external-dns/rt53-creds
  • kube-system/openstack-cloud-config
  • kube-system/os-app-creds
  • kube-system/sh.helm.release.v1.openstack-ccm.v1
  • kube-system/sh.helm.release.v1.openstack-csi.v1
  • nats/dev-nats-tower-credentials
  • vector-aggregator/vector-aggregator-nats-creds
INFOSecret Inventory
139 secrets total, 89 Opaque type
PASSExternal Secrets Management Present
Found: clusterexternalsecrets.external-secrets.io, externalsecrets.external-secrets.io, vaultdynamicsecrets.generators.external-secrets.io

K04: Lack of Centralized Policy Enforcement

16 issue(s) / 2 finding(s)
CRITICALPod Security Admission Not Enforced
Only 1/17 application namespaces have PSA enforce labels
Affected Resources
  • princess-peach: restricted
INFOValidation Policies Found
10 policies with validate rules
Affected Resources
  • disallow-host-namespaces
  • disallow-host-path-volumes
  • disallow-host-ports
  • disallow-latest-tag
  • disallow-privilege-escalation
  • disallow-privileged-containers
  • require-drop-all-capabilities
  • require-readonly-rootfs
  • require-resource-limits
  • require-run-as-nonroot

K05: Missing Network Segmentation

0 issue(s) / 1 finding(s)
PASSNetwork Segmentation Present
K8s: 1, Cilium: 0+0, Istio: 0

K06: Overly Exposed Cluster Components

3 issue(s) / 2 finding(s)
MEDIUMLoadBalancer Services Exposed
3 services directly exposed via LoadBalancer
Affected Resources
  • nats/dev-nats (139.66.40.83)
  • nessus-manager/nessus-manager-agents (139.66.21.167)
  • nessus-scanner/tenable-nessus (139.66.13.154)
PASSAll Ingresses Use TLS
All 10 ingresses have TLS configured

K07: Misconfigured Cluster Components

0 issue(s) / 0 finding(s)

K08: Cluster-to-Cloud Lateral Movement

6 issue(s) / 1 finding(s)
MEDIUMCloud Credentials Accessible In-Cluster
6 secrets contain cloud provider credentials
Affected Resources
  • cert-manager/rt53-creds
  • external-dns/rt53-creds
  • kube-system/openstack-cloud-config
  • kube-system/os-app-creds
  • kube-system/sh.helm.release.v1.openstack-ccm.v1
  • kube-system/sh.helm.release.v1.openstack-csi.v1

K09: Broken Authentication Mechanisms

18 issue(s) / 2 finding(s)
MEDIUMDefault SA Auto-Mounts Tokens
17 namespaces have default SA with automountServiceAccountToken != false
Affected Resources
  • cilium-secrets
  • clamav
  • cnpg
  • default
  • external-dns
  • fluent-bit
  • grafana
  • kcm-system
  • nats
  • nessus-manager
  • nessus-scanner
  • pgadmin4
  • projectsveltos
  • splunk-operator
  • tenable
  • tenable-enclave
  • vector-aggregator
MEDIUMNo mTLS Enforcement
No Istio PeerAuthentication resources found

K10: Inadequate Logging and Monitoring

0 issue(s) / 1 finding(s)
PASSSecurity Monitoring Present
4/4 monitoring categories covered
Affected Resources
  • Runtime Security (Falco)
  • Log Collection (Vector/Fluentd/Fluentbit)
  • SIEM (Splunk/ELK)
  • Network Observability (Hubble)

🔎 CWE/SANS Top 25 (2025)

Assessment mapped from 2025 CWE Top 25 to Kubernetes controls  |  13 findings, 132 affected resources
52
High
32
High
100
Medium

CWE Kubernetes Relevance Mapping

RankCWE IDWeaknessK8s Relevance
1CWE-79XSS: Cross-site ScriptingHigh — WAF/ModSecurity at ingress layer
2CWE-89SQL InjectionHigh — Database service exposure, parameterized queries
3CWE-352Cross-Site Request Forgery (CSRF)Medium — Ingress-level CSRF protection headers
4CWE-862Missing AuthorizationCritical — RBAC — missing authorization on SA/roles
5CWE-787Out-of-bounds WriteMedium — Image vulnerability scanning (Trivy)
6CWE-22Path TraversalCritical — hostPath mounts enable path traversal
7CWE-416Use After FreeMedium — Image vulnerability scanning (Trivy)
8CWE-125Out-of-bounds ReadMedium — Image vulnerability scanning (Trivy)
9CWE-78OS Command InjectionCritical — Command injection — readOnlyRootFS, runAsNonRoot
10CWE-94Code InjectionCritical — pods/exec RBAC = code injection vector
11CWE-120Classic Buffer OverflowLow — Image vulnerability scanning (Trivy)
12CWE-434Unrestricted Upload of Dangerous File TypeMedium — readOnlyRootFilesystem, ephemeral storage
13CWE-476NULL Pointer DereferenceLow — Image vulnerability scanning (Trivy)
14CWE-121Stack-based Buffer OverflowLow — Application-level
15CWE-502Deserialization of Untrusted DataHigh — Deserialization — readOnlyRootFS, network policies
16CWE-122Heap-based Buffer OverflowLow — Application-level
17CWE-863Incorrect AuthorizationCritical — Broken access control — RBAC misconfig
18CWE-20Improper Input ValidationLow — Application-level
19CWE-284Improper Access ControlCritical — Improper access control — RBAC
20CWE-200Exposure of Sensitive InformationHigh — Env var exposure, secret protection
21CWE-306Missing Authentication for Critical FunctionHigh — Missing authentication — Ingress auth annotations
22CWE-918Server-Side Request Forgery (SSRF)High — SSRF — NetworkPolicy egress restrictions
23CWE-77Command InjectionCritical — Command injection — same as CWE-78
24CWE-639Authorization Bypass Through User-Controlled KeyMedium — SA token automount = authorization bypass vector
25CWE-770Allocation of Resources Without LimitsCritical — Resource limits prevent DoS

CWE Detailed Findings

132 affected resource(s) / 13 finding(s)
HIGHCWE-22: Pods with hostPath volume mounts (Path Traversal risk)
27 pod(s) mount host filesystem paths. A compromised container could traverse the host filesystem.
Affected Resources
  • fluent-bit/dev-fluent-bit-4kzmb mounts hostPath=/var/log
  • fluent-bit/dev-fluent-bit-4kzmb mounts hostPath=/var/lib/docker/containers
  • fluent-bit/dev-fluent-bit-4kzmb mounts hostPath=/etc/machine-id
  • fluent-bit/dev-fluent-bit-9wqsp mounts hostPath=/var/log
  • fluent-bit/dev-fluent-bit-9wqsp mounts hostPath=/var/lib/docker/containers
  • fluent-bit/dev-fluent-bit-9wqsp mounts hostPath=/etc/machine-id
  • fluent-bit/dev-fluent-bit-dv8cq mounts hostPath=/var/log
  • fluent-bit/dev-fluent-bit-dv8cq mounts hostPath=/var/lib/docker/containers
  • fluent-bit/dev-fluent-bit-dv8cq mounts hostPath=/etc/machine-id
  • fluent-bit/dev-fluent-bit-fndxz mounts hostPath=/var/log
  • fluent-bit/dev-fluent-bit-fndxz mounts hostPath=/var/lib/docker/containers
  • fluent-bit/dev-fluent-bit-fndxz mounts hostPath=/etc/machine-id
  • fluent-bit/dev-fluent-bit-kbpxk mounts hostPath=/var/log
  • fluent-bit/dev-fluent-bit-kbpxk mounts hostPath=/var/lib/docker/containers
  • fluent-bit/dev-fluent-bit-kbpxk mounts hostPath=/etc/machine-id
  • fluent-bit/dev-fluent-bit-lb5j9 mounts hostPath=/var/log
  • fluent-bit/dev-fluent-bit-lb5j9 mounts hostPath=/var/lib/docker/containers
  • fluent-bit/dev-fluent-bit-lb5j9 mounts hostPath=/etc/machine-id
  • fluent-bit/dev-fluent-bit-s82rz mounts hostPath=/var/log
  • fluent-bit/dev-fluent-bit-s82rz mounts hostPath=/var/lib/docker/containers
  • fluent-bit/dev-fluent-bit-s82rz mounts hostPath=/etc/machine-id
  • fluent-bit/dev-fluent-bit-vfs2w mounts hostPath=/var/log
  • fluent-bit/dev-fluent-bit-vfs2w mounts hostPath=/var/lib/docker/containers
  • fluent-bit/dev-fluent-bit-vfs2w mounts hostPath=/etc/machine-id
  • fluent-bit/dev-fluent-bit-zl6fh mounts hostPath=/var/log
  • fluent-bit/dev-fluent-bit-zl6fh mounts hostPath=/var/lib/docker/containers
  • fluent-bit/dev-fluent-bit-zl6fh mounts hostPath=/etc/machine-id
HIGHCWE-94: ClusterRoles allowing pod exec/attach (Code Injection vector)
5 ClusterRole(s) grant pods/exec or pods/attach create access, enabling code injection into running containers.
Affected Resources
  • ClusterRole/admin
  • ClusterRole/cnpg-operator-cloudnative-pg
  • ClusterRole/edit
  • ClusterRole/splunk-operator-manager-role
  • ClusterRole/system:aggregate-to-edit
MEDIUMCWE-79: Ingresses without WAF/ModSecurity protection
10 ingress(es) expose web applications without WAF annotations (ModSecurity/OWASP CRS). XSS attacks against exposed web apps are not mitigated at the ingress layer.
Affected Resources
  • argo-cd/argo-cd-argocd-server
  • burpsuite/bsee-ingress
  • grafana/dev-grafana
  • nats/dev-nats-tower
  • nessus-manager/nessus-manager-ui
  • pgadmin4/dev-pgadmin4
  • princess-peach/princess-peach
  • splunk/shc-dev-ingress
  • tenable-enclave/dev-tenable-enclave-tes-operator
  • vector-aggregator/dev-vector-aggregator
MEDIUMCWE-78/CWE-77: Containers without readOnlyRootFilesystem or runAsNonRoot
30 container(s) run without readOnlyRootFilesystem AND runAsNonRoot. If command injection is exploited, attackers gain writable root filesystem access as root user.
Affected Resources
  • fluent-bit/dev-fluent-bit-4kzmb/fluent-bit
  • fluent-bit/dev-fluent-bit-4kzmb/nats-publisher
  • fluent-bit/dev-fluent-bit-9wqsp/fluent-bit
  • fluent-bit/dev-fluent-bit-9wqsp/nats-publisher
  • fluent-bit/dev-fluent-bit-dv8cq/fluent-bit
  • fluent-bit/dev-fluent-bit-dv8cq/nats-publisher
  • fluent-bit/dev-fluent-bit-fndxz/fluent-bit
  • fluent-bit/dev-fluent-bit-fndxz/nats-publisher
  • fluent-bit/dev-fluent-bit-kbpxk/fluent-bit
  • fluent-bit/dev-fluent-bit-kbpxk/nats-publisher
  • fluent-bit/dev-fluent-bit-lb5j9/fluent-bit
  • fluent-bit/dev-fluent-bit-lb5j9/nats-publisher
  • fluent-bit/dev-fluent-bit-s82rz/fluent-bit
  • fluent-bit/dev-fluent-bit-s82rz/nats-publisher
  • fluent-bit/dev-fluent-bit-vfs2w/fluent-bit
  • fluent-bit/dev-fluent-bit-vfs2w/nats-publisher
  • fluent-bit/dev-fluent-bit-zl6fh/fluent-bit
  • fluent-bit/dev-fluent-bit-zl6fh/nats-publisher
  • nats/dev-nats-0/nats
  • nats/dev-nats-0/reloader
  • nats/dev-nats-1/nats
  • nats/dev-nats-1/reloader
  • nats/dev-nats-2/nats
  • nats/dev-nats-2/reloader
  • nats/dev-nats-box-5dbd879cd9-b8g5q/nats-box
  • nats/dev-nats-tower-0/nats-tower
  • nats/dev-nats-tower-stream-init-sq66f/stream-init
  • nessus-manager/nessus-manager-0/nessus-manager
  • nessus-scanner/nessus-7d59669dd7-bsdtv/securitycenter
  • pgadmin4/dev-pgadmin4-7c99f47cc8-xq7mt/pgadmin4
MEDIUMCWE-306: Ingresses without authentication annotations
9 ingress(es) have no external authentication configured (auth-url, auth-signin, etc).
Affected Resources
  • argo-cd/argo-cd-argocd-server (argo.security.sci-dev.scs.sap)
  • burpsuite/bsee-ingress (burpsuite.security.sci-dev.scs.sap)
  • grafana/dev-grafana (security-dashboard.security.sci-dev.scs.sap)
  • nats/dev-nats-tower (nats-tower.security.sci-dev.scs.sap)
  • nessus-manager/nessus-manager-ui (nessus.security.sci-dev.scs.sap)
  • pgadmin4/dev-pgadmin4 (pgadmin4.security.sci-dev.scs.sap)
  • princess-peach/princess-peach (princess-peach.never.security.sci-dev.scs.sap)
  • splunk/shc-dev-ingress (splunk.security.sci-dev.scs.sap)
  • tenable-enclave/dev-tenable-enclave-tes-operator (tenable-enclave.security.sci-dev.scs.sap)
MEDIUMCWE-918: Insufficient network policies to prevent SSRF
Only 1 NetworkPolicy(ies) across 33 namespaces. Pods can reach cloud metadata endpoints (169.254.169.254) and internal services, enabling SSRF attacks.
MEDIUMCWE-770: Containers without resource limits (DoS risk)
19 container(s) have no resource limits. A runaway process could exhaust node resources (Denial of Service).
Affected Resources
  • cnpg/cnpg-operator-cloudnative-pg-6b8754bf9b-2zr97/manager
  • external-dns/external-dns-6cbf69b969-658w4/external-dns
  • fluent-bit/dev-fluent-bit-4kzmb/fluent-bit
  • fluent-bit/dev-fluent-bit-9wqsp/fluent-bit
  • fluent-bit/dev-fluent-bit-dv8cq/fluent-bit
  • fluent-bit/dev-fluent-bit-fndxz/fluent-bit
  • fluent-bit/dev-fluent-bit-kbpxk/fluent-bit
  • fluent-bit/dev-fluent-bit-lb5j9/fluent-bit
  • fluent-bit/dev-fluent-bit-s82rz/fluent-bit
  • fluent-bit/dev-fluent-bit-vfs2w/fluent-bit
  • fluent-bit/dev-fluent-bit-zl6fh/fluent-bit
  • grafana/dev-grafana-5dbcfccc84-zm5jp/grafana-sc-dashboard
  • grafana/dev-grafana-5dbcfccc84-zm5jp/grafana-sc-datasources
  • grafana/dev-grafana-prometheus-server-755f57f586-8lfd7/prometheus-server-configmap-reload
  • nats/dev-nats-0/reloader
  • nats/dev-nats-1/reloader
  • nats/dev-nats-2/reloader
  • nats/dev-nats-box-5dbd879cd9-b8g5q/nats-box
  • pgadmin4/dev-pgadmin4-7c99f47cc8-xq7mt/pgadmin4
INFOCWE-79/CWE-89/CWE-352: Application-layer injection/CSRF weaknesses
XSS, SQL Injection, and CSRF are primarily application-code vulnerabilities. Mitigation: Use WAFs at the ingress layer, keep container images updated, run vulnerability scanners on application code.
INFOCWE-787/CWE-416/CWE-125/CWE-120/CWE-121/CWE-122/CWE-476: Memory safety weaknesses (C/C++ binary vulnerabilities)
Out-of-bounds Write/Read, Use After Free, Buffer Overflows, and NULL Pointer Dereference are binary-level vulnerabilities. Mitigation: Use container image vulnerability scanners (Trivy, Grype) to detect known CVEs in base images. Apply readOnlyRootFilesystem and drop all capabilities to limit exploit impact.
INFOCWE-434: Unrestricted file upload
Applies to web applications allowing file uploads. Mitigation: readOnlyRootFilesystem, ephemeral container storage, and network policies limit post-exploitation impact.
INFOTrivy VulnerabilityReports not available
aquasecurity.github.io CRDs not installed. Consider deploying Trivy Operator for image vulnerability scanning.
PASSCWE-89: No database services directly exposed
All database services use ClusterIP (internal only).
PASSCWE-200: No plain-text secrets detected in environment variables
All sensitive env vars use secretKeyRef or are absent.

🌏 NIST Cybersecurity Framework (CSF) 2.0

Assessment mapped to NIST CSF 2.0 (Feb 2024) — 6 Functions, 22 Categories, 106 Subcategories. 12 findings, 183 affected resources
30
Medium
18
High
64
Medium
101
Info

CSF 2.0 Function Mapping

FunctionIDFocus AreaK8s Controls
GOVERNGVOrganizational context, risk strategy, supply chainKyverno policies, namespace labels, image registries
IDENTIFYIDAsset management, risk assessmentResource inventory, vulnerability scanning
PROTECTPRAccess control, data security, platform securityRBAC, PSA, Secrets, resource limits
DETECTDEContinuous monitoring, adverse eventsFalco, Vector/Splunk logging
RESPONDRSIncident management, analysisNetworkPolicies for containment
RECOVERRCRecovery planningBackup CronJobs, Velero

CSF 2.0 Detailed Findings

12 finding(s)
HIGH ID.RA - No Vulnerability Scanning

No Trivy/Grype operator detected

HIGH PR.PS - Pod Security Standards Not Enforced

17/17 application namespaces lack PSA enforce labels

  • cilium-secrets
  • clamav
  • cnpg
  • default
  • external-dns
  • fluent-bit
  • grafana
  • kcm-system
  • nats
  • nessus-manager
  • nessus-scanner
  • pgadmin4
  • projectsveltos
  • splunk-operator
  • tenable
  • tenable-enclave
  • vector-aggregator
MEDIUM GV.RM - Policies in Audit Only

12 policies exist but none enforce

  • cnpg-burpsuite-db-pod-policy
  • disallow-host-namespaces
  • disallow-host-path-volumes
  • disallow-host-ports
  • disallow-latest-tag
  • disallow-privilege-escalation
  • disallow-privileged-containers
  • kube-env-policy
  • require-drop-all-capabilities
  • require-readonly-rootfs
  • require-resource-limits
  • require-run-as-nonroot
MEDIUM PR.IR - Containers Without Resource Limits

19 containers lack limits

  • cnpg/cnpg-operator-cloudnative-pg-6b8754bf9b-2zr97/manager
  • external-dns/external-dns-6cbf69b969-658w4/external-dns
  • fluent-bit/dev-fluent-bit-4kzmb/fluent-bit
  • fluent-bit/dev-fluent-bit-9wqsp/fluent-bit
  • fluent-bit/dev-fluent-bit-dv8cq/fluent-bit
  • fluent-bit/dev-fluent-bit-fndxz/fluent-bit
  • fluent-bit/dev-fluent-bit-kbpxk/fluent-bit
  • fluent-bit/dev-fluent-bit-lb5j9/fluent-bit
  • fluent-bit/dev-fluent-bit-s82rz/fluent-bit
  • fluent-bit/dev-fluent-bit-vfs2w/fluent-bit
  • fluent-bit/dev-fluent-bit-zl6fh/fluent-bit
  • grafana/dev-grafana-5dbcfccc84-zm5jp/grafana-sc-dashboard
  • grafana/dev-grafana-5dbcfccc84-zm5jp/grafana-sc-datasources
  • grafana/dev-grafana-prometheus-server-755f57f586-8lfd7/prometheus-server-configmap-reload
  • nats/dev-nats-0/reloader
  • nats/dev-nats-1/reloader
  • nats/dev-nats-2/reloader
  • nats/dev-nats-box-5dbd879cd9-b8g5q/nats-box
  • pgadmin4/dev-pgadmin4-7c99f47cc8-xq7mt/pgadmin4
MEDIUM RS.MA - Insufficient Network Isolation

Only 1 NetworkPolicies for containment

  • pgadmin4/dev-pgadmin4
MEDIUM RC.RP - No Backup Jobs

No backup/snapshot CronJobs found

INFO GV.SC - Container Image Registries

12 registries: clamav, cr.fluentbit.io, docker.io, ecr-public.aws.com, ghcr.io, natsio, nginxinc, public.ecr.aws, quay.io, registry.k8s.io

  • clamav
  • cr.fluentbit.io
  • docker.io
  • ecr-public.aws.com
  • ghcr.io
  • natsio
  • nginxinc
  • public.ecr.aws
  • quay.io
  • registry.k8s.io
  • tenable
  • timberio
INFO PR.DS - Secrets Inventory

89 Opaque secrets. Verify encryption at rest.

  • argo-cd/argocd-initial-admin-secret
  • argo-cd/argocd-notifications-secret
  • argo-cd/argocd-redis
  • argo-cd/argocd-repo-creds-ssh-creds
  • argo-cd/argocd-repo-git-repo
  • argo-cd/argocd-repo-keppel-helm-repo
  • argo-cd/argocd-secret
  • argo-cd/cluster-ca-bundle
  • argo-cd/repo-sci-security
  • burpsuite/burpsuite-db-cnpg-backup-creds
  • burpsuite/cluster-ca-bundle
  • burpsuite/cnpg-burpsuite-db-cluster-ca
  • burpsuite/dev-burpsuite-enterprise-server-secret
  • burpsuite/dev-burpsuite-relay-shared-secret
  • burpsuite/dev-burpsuite-scanning-shared-secret
  • burpsuite/dev-burpsuite-web-server-secret
  • cert-manager/cert-manager-webhook-ca
  • cert-manager/cluster-ca-bundle
  • cert-manager/cluster-ca-crt-bundle
  • cert-manager/rt53-creds
PASS ID.AM - Asset Inventory

15 nodes, 191 pods, 76 services, 33 namespaces

PASS PR.AA - RBAC Reviewed

No non-system SAs bound to admin roles

PASS DE.CM - Runtime Monitoring Active

Falco on 13 nodes

  • dev-falco-2nkw2
  • dev-falco-7rgfx
  • dev-falco-c8zfk
  • dev-falco-falcosidekick-6bf9c5646b-dmcs8
  • dev-falco-falcosidekick-6bf9c5646b-f4h22
  • dev-falco-fv5h8
  • dev-falco-k2bjv
  • dev-falco-l2jgx
  • dev-falco-ldwt7
  • dev-falco-m9q6r
PASS DE.AE - Log Collection Active

9 log collector pods

  • dev-vector-aggregator-0
  • dev-vector-4rplh
  • dev-vector-5gd6c
  • dev-vector-5hpbc
  • dev-vector-769nm
  • dev-vector-8l5nf
  • dev-vector-bsn6q
  • dev-vector-pfpkj
  • dev-vector-tvxn5

📜 NIST SP 800-53 Rev 5

Assessment mapped to NIST SP 800-53 Rev 5 — 20 Control Families, 1000+ Controls. 12 findings, 150 affected resources
41
High
16
Critical
1
High
43
Medium
90
Info

Assessed Control Families

FamilyIDControlsK8s Implementation
Access ControlACAC-3, AC-6RBAC, SA tokens, privileged containers
Audit & AccountabilityAUAU-2, AU-3, AU-6Logging, runtime audit (Falco)
Security AssessmentCACA-2PolicyReports, compliance scanning
Config ManagementCMCM-2, CM-7ResourceQuotas, hostNetwork
Identification & AuthIAIA-5Default SA automount
System & Comms ProtectionSCSC-7, SC-8, SC-28NetworkPolicies, TLS, Secrets
System & Info IntegritySISI-2, SI-4Vuln scanning, monitoring

SP 800-53 Detailed Findings

12 finding(s)
CRITICAL SC-7 Boundary Protection: Missing NetworkPolicies

16/33 namespaces lack policies

  • cilium-secrets
  • clamav
  • cnpg
  • default
  • external-dns
  • fluent-bit
  • grafana
  • kcm-system
  • nats
  • nessus-manager
  • nessus-scanner
  • projectsveltos
  • splunk-operator
  • tenable
  • tenable-enclave
  • vector-aggregator
HIGH SI-2 Flaw Remediation: No Vuln Scanning

No Trivy operator detected

MEDIUM AC-3 Access Enforcement: SA Token Auto-Mount

26 app pods auto-mount SA tokens

  • clamav/dev-clamav-7f99944445-sm6jh
  • cnpg/cnpg-operator-cloudnative-pg-6b8754bf9b-2zr97
  • external-dns/external-dns-6cbf69b969-658w4
  • fluent-bit/dev-fluent-bit-4kzmb
  • fluent-bit/dev-fluent-bit-9wqsp
  • fluent-bit/dev-fluent-bit-dv8cq
  • fluent-bit/dev-fluent-bit-fndxz
  • fluent-bit/dev-fluent-bit-kbpxk
  • fluent-bit/dev-fluent-bit-lb5j9
  • fluent-bit/dev-fluent-bit-s82rz
  • fluent-bit/dev-fluent-bit-vfs2w
  • fluent-bit/dev-fluent-bit-zl6fh
  • grafana/dev-grafana-5dbcfccc84-zm5jp
  • grafana/dev-grafana-prometheus-server-755f57f586-8lfd7
  • nats/dev-nats-0
  • nats/dev-nats-1
  • nats/dev-nats-2
  • nats/dev-nats-box-5dbd879cd9-b8g5q
  • nats/dev-nats-tower-0
  • nats/dev-nats-tower-stream-init-sq66f
MEDIUM IA-5 Authenticator Mgmt: Default SA Auto-Mount

17 namespaces with default SA automount

  • cilium-secrets
  • clamav
  • cnpg
  • default
  • external-dns
  • fluent-bit
  • grafana
  • kcm-system
  • nats
  • nessus-manager
  • nessus-scanner
  • pgadmin4
  • projectsveltos
  • splunk-operator
  • tenable
  • tenable-enclave
  • vector-aggregator
INFO AC - RBAC Overview

104 CRBs, 1 admin/cluster-admin

  • cluster-admin
INFO SC-28 Info at Rest: Secrets

89 Opaque secrets. Verify etcd encryption.

PASS AU-2/AU-3 Audit Events: Logging Active

20 log/SIEM pods

  • splunk-operator-controller-manager-f99856648-ft2s5
  • splunk-cm-dev-cluster-manager-0
  • splunk-idxc-dev-indexer-0
  • splunk-idxc-dev-indexer-1
  • splunk-idxc-dev-indexer-2
  • splunk-lm-dev-license-manager-0
  • splunk-mc-dev-monitoring-console-0
  • splunk-shc-dev-deployer-0
  • splunk-shc-dev-search-head-0
  • splunk-shc-dev-search-head-1
PASS AU-6 Audit Review: Runtime Security

Falco on 13 nodes

  • dev-falco-2nkw2
  • dev-falco-7rgfx
  • dev-falco-c8zfk
  • dev-falco-falcosidekick-6bf9c5646b-dmcs8
  • dev-falco-falcosidekick-6bf9c5646b-f4h22
  • dev-falco-fv5h8
  • dev-falco-k2bjv
  • dev-falco-l2jgx
  • dev-falco-ldwt7
  • dev-falco-m9q6r
PASS CA-2 Security Assessments: Policy Reports

1 ClusterPolicyReports

PASS CM-2 Baseline Config: ResourceQuotas

12 defined

PASS SC-8 Transmission Confidentiality: TLS OK

All 10 ingresses use TLS

PASS SI-4 System Monitoring: Active

4 monitoring pods

  • dev-grafana-5dbcfccc84-zm5jp
  • dev-grafana-prometheus-server-755f57f586-8lfd7
  • hubble-relay-698fcf6457-tzj68
  • hubble-ui-77d4cd6ff5-g6k47

⏱ Runtime Security

Live runtime analysis of running workloads, pod health, container states, and security agent status. 10 findings, 22 affected resources
6
Good
5
High
9
Medium
1
Low
7
Info

Runtime Check Categories

CheckIDDescriptionSeverity
CrashloopingRT01Containers with 5+ restartsHIGH
OOMKilledRT02Containers terminated by OOMHIGH
Pod StateRT03Pods in Failed/Unknown phaseMEDIUM
Image TagsRT04Running :latest or untagged imagesMEDIUM
Health ProbesRT05Missing liveness/readiness probesMEDIUM
EphemeralRT06Active debug containersMEDIUM
Stale PodsRT07Running 90+ days without restartLOW
K8s EventsRT08Warning events in last hourINFO
Pull PolicyRT09IfNotPresent with mutable tagsMEDIUM
Security AgentRT10Falco/Tetragon statusHIGH
Unready PodsRT11Not ready for 5+ minutesMEDIUM
Replica DriftRT12Available < desired replicasMEDIUM

Runtime Security Detailed Findings

10 finding(s)
HIGH Crashlooping Containers

2 container(s) have 5+ restarts, indicating instability or repeated failure

  • splunk-operator/splunk-operator-controller-manager-f99856648-ft2s5/manager (restarts=9)
  • vector-aggregator/dev-vector-aggregator-0/vector (restarts=13)
HIGH OOMKilled Containers

2 container(s) were recently OOMKilled - possible memory exhaustion

  • nats/dev-nats-0/nats
  • nats/dev-nats-1/nats
HIGH Runtime Security Agent Unhealthy

1 Falco pod(s) are not in Running state

  • falco/dev-falco-927gc (phase=Pending)
MEDIUM Running Containers Without Health Probes

7 running container(s) lack both liveness and readiness probes

  • grafana/dev-grafana-5dbcfccc84-zm5jp/grafana-sc-dashboard
  • grafana/dev-grafana-5dbcfccc84-zm5jp/grafana-sc-datasources
  • nats/dev-nats-0/reloader
  • nats/dev-nats-1/reloader
  • nats/dev-nats-2/reloader
  • nats/dev-nats-box-5dbd879cd9-b8g5q/nats-box
  • tenable-enclave/dev-tenable-enclave-tes-operator-64b66f65b-d6snj/tes-operator
MEDIUM Pods Not Ready for Extended Period

1 pod(s) have been in not-ready state for 5+ minutes

  • vector-aggregator/dev-vector-aggregator-0 (unready 120m)
MEDIUM Deployment Replica Drift

1 deployment(s) have fewer available replicas than desired

  • clamav/dev-clamav (desired=1, available=0)
LOW Stale Long-Running Pods

1 pod(s) running 90+ days without restart

  • projectsveltos/sveltos-agent-manager-74fb58c4db-2tt6q (age=109d)
INFO Recent Warning Events

7 warning event(s) in the last hour

  • clamav/dev-clamav-7f99944445-sm6jh: BackOff - Back-off restarting failed container freshclam-init in pod dev-clamav-7f99944445
  • default/test-config: UpdateFailed - error processing spec.data[0] (key: products/security/dev/environment/test-confi
  • -/vault-backend: InvalidProviderConfig - invalid vault credentials: Error making API request. URL: GET https://vault.sms
  • nats/dev-nats-tower-0: FailedMount - MountVolume.SetUp failed for volume "nats-ca" : secret "nats-ca-cert" not found
  • nats/dev-nats-tower-stream-init-sq66f: FailedMount - MountVolume.SetUp failed for volume "nats-creds-btp-nats-token" : secret "btp-na
  • vector-aggregator/dev-vector-aggregator-0: Failed - Error: secret "vector-splunk-hec-token" not found
  • vector-aggregator/dev-vector-aggregator-0: BackOff - Back-off restarting failed container vector in pod dev-vector-aggregator-0_vecto
PASS All Running Images Use Pinned Tags

No running containers use :latest or untagged images

PASS No Ephemeral Containers Detected

No pods have ephemeral debug containers attached