Kubernetes Security Assessment Report

Cluster: never-dev-sec  |  Kubernetes: 1.33  |  Scanned: 2026-04-23 23:00:46 UTC  |  Total Findings: 3410
100
Critical Risk
443
Critical Issues
831
High Issues
2103
Medium Issues
33
Low Issues
233
Info Issues
3
Pass Issues

🛡 OWASP Kubernetes Top 10

Assessment based on the OWASP Kubernetes Top Ten framework  |  26 findings, 1568 affected resources
357 Critical 77 High 1131 Medium 3 Pass
CategoryRiskFindingsWorst Severity
K01Insecure Workload Configurations1351 issue(s) / 8 finding(s)CRITICAL
K02Overly Permissive RBAC6 issue(s) / 2 finding(s)CRITICAL
K03Secrets Management Failures8 issue(s) / 3 finding(s)MEDIUM
K04Lack of Centralized Policy Enforcement32 issue(s) / 2 finding(s)CRITICAL
K05Missing Network Segmentation31 issue(s) / 1 finding(s)CRITICAL
K06Overly Exposed Cluster Components5 issue(s) / 2 finding(s)MEDIUM
K07Misconfigured Cluster Components92 issue(s) / 3 finding(s)HIGH
K08Cluster-to-Cloud Lateral Movement6 issue(s) / 1 finding(s)MEDIUM
K09Broken Authentication Mechanisms33 issue(s) / 2 finding(s)MEDIUM
K10Inadequate Logging and Monitoring1 issue(s) / 2 finding(s)MEDIUM

K01: Insecure Workload Configurations

1351 issue(s) / 8 finding(s)
CRITICALPrivileged Containers
82 containers run with privileged: true
Affected Resources
  • falco/test-falco-4ttzt/falco
  • falco/test-falco-4ttzt/falco-driver-loader
  • falco/test-falco-5sbff/falco
  • falco/test-falco-5sbff/falco-driver-loader
  • falco/test-falco-bw6sg/falco
  • falco/test-falco-bw6sg/falco-driver-loader
  • falco/test-falco-fm42l/falco
  • falco/test-falco-fm42l/falco-driver-loader
  • falco/test-falco-hd8g7/falco
  • falco/test-falco-hd8g7/falco-driver-loader
  • falco/test-falco-k8p25/falco
  • falco/test-falco-k8p25/falco-driver-loader
  • falco/test-falco-mblws/falco
  • falco/test-falco-mblws/falco-driver-loader
  • falco/test-falco-mq8vw/falco
  • falco/test-falco-mq8vw/falco-driver-loader
  • falco/test-falco-qbt4d/falco
  • falco/test-falco-qbt4d/falco-driver-loader
  • falco/test-falco-qpfdl/falco
  • falco/test-falco-qpfdl/falco-driver-loader
CRITICALHost Network Enabled
88 pods use hostNetwork: true
Affected Resources
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-65442
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-7995w
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-f9pqb
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-fkq8r
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-h4dnq
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-j7xgg
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-kc76c
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-krs67
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-v68cj
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-whdsf
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-nbc5t
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-s86bq
  • kube-system/cilium-7knzf
  • kube-system/cilium-7xhwv
  • kube-system/cilium-bzlvg
  • kube-system/cilium-envoy-69kfp
  • kube-system/cilium-envoy-7llfh
  • kube-system/cilium-envoy-d5chk
  • kube-system/cilium-envoy-ddms4
  • kube-system/cilium-envoy-fzzwc
CRITICALHost PID Enabled
12 pods use hostPID: true
Affected Resources
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-65442
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-7995w
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-f9pqb
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-fkq8r
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-h4dnq
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-j7xgg
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-kc76c
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-krs67
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-v68cj
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-whdsf
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-nbc5t
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-s86bq
CRITICALHost Path Mounts
110 pods mount host paths
Affected Resources
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-65442 -> /
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-7995w -> /
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-f9pqb -> /
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-fkq8r -> /
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-h4dnq -> /
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-j7xgg -> /
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-kc76c -> /
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-krs67 -> /
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-v68cj -> /
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-whdsf -> /
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-nbc5t -> /
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-s86bq -> /
  • falco/test-falco-4ttzt -> /var/run/docker.sock
  • falco/test-falco-5sbff -> /var/run/docker.sock
  • falco/test-falco-bw6sg -> /var/run/docker.sock
  • falco/test-falco-fm42l -> /var/run/docker.sock
  • falco/test-falco-hd8g7 -> /var/run/docker.sock
  • falco/test-falco-k8p25 -> /var/run/docker.sock
  • falco/test-falco-mblws -> /var/run/docker.sock
  • falco/test-falco-mq8vw -> /var/run/docker.sock
HIGHHost IPC Enabled
12 pods use hostIPC: true
Affected Resources
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-65442
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-7995w
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-f9pqb
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-fkq8r
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-h4dnq
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-j7xgg
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-kc76c
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-krs67
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-v68cj
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-whdsf
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-nbc5t
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-s86bq
MEDIUMMissing readOnlyRootFilesystem
365 containers lack readOnlyRootFilesystem: true
Affected Resources
  • burpsuite/test-burpsuite-connection-relay-56566cbf9f-q7m69/connection-relay
  • burpsuite/test-burpsuite-enterprise-server-58c8584545-qdhf5/enterprise-server
  • burpsuite/test-burpsuite-enterprise-server-58c8584545-qdhf5/init-burp-download
  • burpsuite/test-burpsuite-enterprise-server-58c8584545-qdhf5/init-enterprise-server-keystore
  • burpsuite/test-burpsuite-scan-controller-94bbdccbb-7njv9/scan-controller
  • burpsuite/test-burpsuite-scan-controller-94bbdccbb-d444c/scan-controller
  • burpsuite/test-burpsuite-scan-controller-94bbdccbb-gvk7g/scan-controller
  • burpsuite/test-burpsuite-web-server-8464668497-kp4m4/web-server
  • burpsuite/test-burpsuite-web-server-8464668497-kp4m4/init-web-server-keystore
  • burpsuite/ubuntu-change-pvc-permissions-6l62k/ubuntu
  • default/httpbin-56c54d77b8-9cd8d/httpbin
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-65442/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-7995w/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-f9pqb/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-fkq8r/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-h4dnq/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-j7xgg/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-kc76c/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-krs67/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-v68cj/debugger
MEDIUMMissing runAsNonRoot
380 containers lack runAsNonRoot: true
Affected Resources
  • burpsuite/test-burpsuite-enterprise-server-58c8584545-qdhf5/enterprise-server
  • burpsuite/test-burpsuite-enterprise-server-58c8584545-qdhf5/init-burp-download
  • burpsuite/test-burpsuite-enterprise-server-58c8584545-qdhf5/init-enterprise-server-keystore
  • burpsuite/test-burpsuite-web-server-8464668497-kp4m4/web-server
  • burpsuite/test-burpsuite-web-server-8464668497-kp4m4/init-web-server-keystore
  • burpsuite/ubuntu-change-pvc-permissions-6l62k/ubuntu
  • cert-manager/cert-manager-cainjector-cf4f94f8c-vjf64/cert-manager-cainjector
  • cert-manager/cert-manager-cainjector-cf4f94f8c-z8mc7/cert-manager-cainjector
  • cert-manager/cert-manager-cd6c7c6b9-2nk6j/cert-manager-controller
  • cert-manager/cert-manager-cd6c7c6b9-k6w8l/cert-manager-controller
  • cert-manager/cert-manager-webhook-6d78ddb474-rp7jd/cert-manager-webhook
  • cert-manager/cert-manager-webhook-6d78ddb474-vzlwx/cert-manager-webhook
  • cnpg/cnpg-operator-cloudnative-pg-58c485df56-jjlx9/manager
  • default/httpbin-56c54d77b8-9cd8d/httpbin
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-65442/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-7995w/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-f9pqb/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-fkq8r/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-h4dnq/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-j7xgg/debugger
MEDIUMMissing Resource Limits
302 containers have no resource limits/requests
Affected Resources
  • argo-cd/argo-cd-argocd-dex-server-57589b5c8b-mzjn2/dex-server
  • argo-cd/argo-cd-argocd-dex-server-57589b5c8b-mzjn2/copyutil
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-5dxdb/haproxy
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-5dxdb/config-init
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-62ftz/haproxy
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-62ftz/config-init
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-8fsl8/haproxy
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-8fsl8/config-init
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-czddh/haproxy
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-czddh/config-init
  • argo-cd/argo-cd-redis-ha-server-0/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-0/redis-exporter
  • argo-cd/argo-cd-redis-ha-server-0/config-init
  • argo-cd/argo-cd-redis-ha-server-1/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-1/redis-exporter
  • argo-cd/argo-cd-redis-ha-server-1/config-init
  • argo-cd/argo-cd-redis-ha-server-2/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-2/redis-exporter
  • argo-cd/argo-cd-redis-ha-server-2/config-init
  • cert-manager/cert-manager-cainjector-cf4f94f8c-vjf64/cert-manager-cainjector

K02: Overly Permissive RBAC

6 issue(s) / 2 finding(s)
CRITICALWildcard ClusterRoles
3 ClusterRoles grant * verbs on * resources
Affected Resources
  • argo-cd-argocd-application-controller
  • cluster-admin
  • system:nodes:autopilot
HIGHCluster-Admin Bindings
3 bindings grant cluster-admin or equivalent
Affected Resources
  • argo-cd-argocd-application-controller -> ServiceAccount/argocd-application-controller
  • cluster-admin -> Group/system:masters
  • system:nodes:autopilot -> Group/system:nodes

K03: Secrets Management Failures

8 issue(s) / 3 finding(s)
MEDIUMCloud Provider Credentials in Secrets
8 secrets appear to contain cloud credentials
Affected Resources
  • argo-cd/argocd-repo-creds-ssh-creds
  • burpsuite/burpsuite-db-cnpg-backup-creds
  • cert-manager/rt53-creds
  • external-dns/rt53-creds
  • kube-system/openstack-cloud-config
  • kube-system/os-app-creds
  • kube-system/sh.helm.release.v1.openstack-ccm.v1
  • kube-system/sh.helm.release.v1.openstack-csi.v1
INFOSecret Inventory
130 secrets total, 83 Opaque type
PASSExternal Secrets Management Present
Found: clusterexternalsecrets.external-secrets.io, externalsecrets.external-secrets.io, vaultdynamicsecrets.generators.external-secrets.io

K04: Lack of Centralized Policy Enforcement

32 issue(s) / 2 finding(s)
CRITICALPod Security Admission Not Enforced
Only 1/32 namespaces have PSA enforce labels
Affected Resources
  • princess-peach: restricted
HIGHNo Validation Policies
No Kyverno/OPA validation policies found to block insecure workloads

K05: Missing Network Segmentation

31 issue(s) / 1 finding(s)
CRITICALMost Namespaces Lack Network Policies
31/32 namespaces have no network policies (K8s: 1, Cilium: 0+0, Istio: 0)
Affected Resources
  • argo-cd
  • burpsuite
  • cert-manager
  • cilium-secrets
  • cnpg
  • default
  • delme-i862106
  • external-dns
  • external-secrets
  • falco
  • ingress-nginx
  • k0s-autopilot
  • k0s-system
  • kcm-system
  • kube-node-lease
  • kube-public
  • kube-system
  • kyverno
  • manila-csi
  • nats

K06: Overly Exposed Cluster Components

5 issue(s) / 2 finding(s)
MEDIUMLoadBalancer Services Exposed
5 services directly exposed via LoadBalancer
Affected Resources
  • ingress-nginx/ingress-nginx-controller (139.66.13.49)
  • kube-system/cilium-ingress (139.66.13.117)
  • nessus-manager/nessus-manager-agents (139.66.21.169)
  • nessus-scanner/tenable-nessus (139.66.13.105)
  • nessus/tenable-nessus (139.66.13.96)
PASSAll Ingresses Use TLS
All 9 ingresses have TLS configured

K07: Misconfigured Cluster Components

92 issue(s) / 3 finding(s)
HIGHNo ResourceQuotas Defined
0/32 namespaces have ResourceQuotas
HIGHTrivy ConfigAudit Issues
29 resources have critical/high configuration findings
Affected Resources
  • default/replicaset-httpbin-56c54d77b8: 0C/1H
  • falco/daemonset-test-falco: 0C/8H
  • ingress-nginx/replicaset-ingress-nginx-controller-6f6f859569: 0C/2H
  • k0s-system/replicaset-k0s-pushgateway-6d8f9785c7: 0C/1H
  • kube-system/daemonset-cilium: 0C/19H
  • kube-system/daemonset-cilium-envoy: 0C/4H
  • kube-system/daemonset-csi-nfs-node: 0C/5H
  • kube-system/daemonset-openstack-cinder-csi-nodeplugin: 0C/7H
  • kube-system/daemonset-openstack-cloud-controller-manager: 0C/2H
  • kube-system/replicaset-cilium-operator-dc56c5457: 0C/3H
  • kube-system/replicaset-coredns-c8d757745: 0C/1H
  • kube-system/replicaset-csi-nfs-controller-68d68c78cc: 0C/6H
  • kube-system/replicaset-hubble-relay-5447cdd779: 0C/1H
  • kube-system/replicaset-hubble-ui-77d4cd6ff5: 0C/2H
  • kube-system/replicaset-openstack-cinder-csi-controllerplugin-6b6b78b7d8: 0C/6H
  • manila-csi/daemonset-manila-csi-openstack-manila-csi-nodeplugin: 0C/5H
  • manila-csi/statefulset-manila-csi-openstack-manila-csi-controllerplugin: 0C/6H
  • nessus-scanner/replicaset-nessus-bd65456d: 0C/1H
  • nessus/replicaset-nessus-bd65456d: 0C/1H
  • pgadmin4/replicaset-test-pgadmin4-79b5dc6f54: 0C/2H
MEDIUMInsufficient LimitRanges
Only 1 LimitRange(s) across 32 namespaces

K08: Cluster-to-Cloud Lateral Movement

6 issue(s) / 1 finding(s)
MEDIUMCloud Credentials Accessible In-Cluster
6 secrets contain cloud provider credentials
Affected Resources
  • cert-manager/rt53-creds
  • external-dns/rt53-creds
  • kube-system/openstack-cloud-config
  • kube-system/os-app-creds
  • kube-system/sh.helm.release.v1.openstack-ccm.v1
  • kube-system/sh.helm.release.v1.openstack-csi.v1

K09: Broken Authentication Mechanisms

33 issue(s) / 2 finding(s)
MEDIUMDefault SA Auto-Mounts Tokens
32 namespaces have default SA with automountServiceAccountToken != false
Affected Resources
  • argo-cd
  • burpsuite
  • cert-manager
  • cilium-secrets
  • cnpg
  • default
  • delme-i862106
  • external-dns
  • external-secrets
  • falco
  • ingress-nginx
  • k0s-autopilot
  • k0s-system
  • kcm-system
  • kube-node-lease
  • kube-public
  • kube-system
  • kyverno
  • manila-csi
  • nats
MEDIUMNo mTLS Enforcement
No Istio PeerAuthentication resources found

K10: Inadequate Logging and Monitoring

1 issue(s) / 2 finding(s)
MEDIUMMissing Monitoring Categories
1 monitoring gaps detected
Affected Resources
  • SIEM (Splunk/ELK)
PASSSecurity Monitoring Present
3/4 monitoring categories covered
Affected Resources
  • Runtime Security (Falco)
  • Log Collection (Vector/Fluentd/Fluentbit)
  • Network Observability (Hubble)

🔎 CWE/SANS Top 25 (2025)

Assessment mapped from 2025 CWE Top 25 to Kubernetes controls  |  14 findings, 1026 affected resources
630 High 396 Medium

CWE Kubernetes Relevance Mapping

RankCWE IDWeaknessK8s Relevance
1CWE-79XSS: Cross-site ScriptingHigh — WAF/ModSecurity at ingress layer
2CWE-89SQL InjectionHigh — Database service exposure, parameterized queries
3CWE-352Cross-Site Request Forgery (CSRF)Medium — Ingress-level CSRF protection headers
4CWE-862Missing AuthorizationCritical — RBAC — missing authorization on SA/roles
5CWE-787Out-of-bounds WriteMedium — Image vulnerability scanning (Trivy)
6CWE-22Path TraversalCritical — hostPath mounts enable path traversal
7CWE-416Use After FreeMedium — Image vulnerability scanning (Trivy)
8CWE-125Out-of-bounds ReadMedium — Image vulnerability scanning (Trivy)
9CWE-78OS Command InjectionCritical — Command injection — readOnlyRootFS, runAsNonRoot
10CWE-94Code InjectionCritical — pods/exec RBAC = code injection vector
11CWE-120Classic Buffer OverflowLow — Image vulnerability scanning (Trivy)
12CWE-434Unrestricted Upload of Dangerous File TypeMedium — readOnlyRootFilesystem, ephemeral storage
13CWE-476NULL Pointer DereferenceLow — Image vulnerability scanning (Trivy)
14CWE-121Stack-based Buffer OverflowLow — Application-level
15CWE-502Deserialization of Untrusted DataHigh — Deserialization — readOnlyRootFS, network policies
16CWE-122Heap-based Buffer OverflowLow — Application-level
17CWE-863Incorrect AuthorizationCritical — Broken access control — RBAC misconfig
18CWE-20Improper Input ValidationLow — Application-level
19CWE-284Improper Access ControlCritical — Improper access control — RBAC
20CWE-200Exposure of Sensitive InformationHigh — Env var exposure, secret protection
21CWE-306Missing Authentication for Critical FunctionHigh — Missing authentication — Ingress auth annotations
22CWE-918Server-Side Request Forgery (SSRF)High — SSRF — NetworkPolicy egress restrictions
23CWE-77Command InjectionCritical — Command injection — same as CWE-78
24CWE-639Authorization Bypass Through User-Controlled KeyMedium — SA token automount = authorization bypass vector
25CWE-770Allocation of Resources Without LimitsCritical — Resource limits prevent DoS

CWE Detailed Findings

1026 affected resource(s) / 14 finding(s)
HIGHCWE-22: Pods with hostPath volume mounts (Path Traversal risk)
616 pod(s) mount host filesystem paths. A compromised container could traverse the host filesystem.
Affected Resources
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-65442 mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-7995w mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-f9pqb mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-fkq8r mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-h4dnq mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-j7xgg mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-kc76c mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-krs67 mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-v68cj mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-whdsf mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-nbc5t mounts hostPath=/
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-s86bq mounts hostPath=/
  • falco/test-falco-4ttzt mounts hostPath=/var/run/docker.sock
  • falco/test-falco-4ttzt mounts hostPath=/run/podman/podman.sock
  • falco/test-falco-4ttzt mounts hostPath=/run/host-containerd/containerd.sock
  • falco/test-falco-4ttzt mounts hostPath=/run/containerd/containerd.sock
  • falco/test-falco-4ttzt mounts hostPath=/run/crio/crio.sock
  • falco/test-falco-4ttzt mounts hostPath=/run/k3s/containerd/containerd.sock
  • falco/test-falco-4ttzt mounts hostPath=/boot
  • falco/test-falco-4ttzt mounts hostPath=/lib/modules
  • falco/test-falco-4ttzt mounts hostPath=/usr
  • falco/test-falco-4ttzt mounts hostPath=/etc
  • falco/test-falco-4ttzt mounts hostPath=/dev
  • falco/test-falco-4ttzt mounts hostPath=/sys/module
  • falco/test-falco-4ttzt mounts hostPath=/sys/kernel
  • falco/test-falco-4ttzt mounts hostPath=/proc
  • falco/test-falco-5sbff mounts hostPath=/var/run/docker.sock
  • falco/test-falco-5sbff mounts hostPath=/run/podman/podman.sock
  • falco/test-falco-5sbff mounts hostPath=/run/host-containerd/containerd.sock
  • falco/test-falco-5sbff mounts hostPath=/run/containerd/containerd.sock
HIGHCWE-94: ClusterRoles allowing pod exec/attach (Code Injection vector)
5 ClusterRole(s) grant pods/exec or pods/attach create access, enabling code injection into running containers.
Affected Resources
  • ClusterRole/admin
  • ClusterRole/cnpg-manager
  • ClusterRole/cnpg-operator-cloudnative-pg
  • ClusterRole/edit
  • ClusterRole/system:aggregate-to-edit
HIGHCWE-200: Sensitive data in plain-text environment variables
9 container(s) have sensitive-looking values in plain-text env vars (not using secretKeyRef).
Affected Resources
  • splunk/splunk-cm-test-cluster-manager-0/splunk env=SPLUNK_DECLARATIVE_ADMIN_PASSWORD
  • splunk/splunk-idxc-test-indexer-0/splunk env=SPLUNK_DECLARATIVE_ADMIN_PASSWORD
  • splunk/splunk-idxc-test-indexer-1/splunk env=SPLUNK_DECLARATIVE_ADMIN_PASSWORD
  • splunk/splunk-idxc-test-indexer-2/splunk env=SPLUNK_DECLARATIVE_ADMIN_PASSWORD
  • splunk/splunk-mc-test-monitoring-console-0/splunk env=SPLUNK_DECLARATIVE_ADMIN_PASSWORD
  • splunk/splunk-shc-test-deployer-0/splunk env=SPLUNK_DECLARATIVE_ADMIN_PASSWORD
  • splunk/splunk-shc-test-search-head-0/splunk env=SPLUNK_DECLARATIVE_ADMIN_PASSWORD
  • splunk/splunk-shc-test-search-head-1/splunk env=SPLUNK_DECLARATIVE_ADMIN_PASSWORD
  • splunk/splunk-shc-test-search-head-2/splunk env=SPLUNK_DECLARATIVE_ADMIN_PASSWORD
MEDIUMCWE-79: Ingresses without WAF/ModSecurity protection
9 ingress(es) expose web applications without WAF annotations (ModSecurity/OWASP CRS). XSS attacks against exposed web apps are not mitigated at the ingress layer.
Affected Resources
  • argo-cd/argo-cd-argocd-server
  • burpsuite/bsee-ingress
  • nats/test-nats-ui-nui
  • nats/test-nats-ws
  • nessus-manager/nessus-manager-ui
  • pgadmin4/test-pgadmin4
  • princess-peach/princess-peach
  • splunk/shc-test-ingress
  • tenable-enclave/test-tenable-enclave-tes-operator
MEDIUMCWE-78/CWE-77: Containers without readOnlyRootFilesystem or runAsNonRoot
92 container(s) run without readOnlyRootFilesystem AND runAsNonRoot. If command injection is exploited, attackers gain writable root filesystem access as root user.
Affected Resources
  • burpsuite/test-burpsuite-enterprise-server-58c8584545-qdhf5/enterprise-server
  • burpsuite/test-burpsuite-web-server-8464668497-kp4m4/web-server
  • burpsuite/ubuntu-change-pvc-permissions-6l62k/ubuntu
  • default/httpbin-56c54d77b8-9cd8d/httpbin
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-65442/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-7995w/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-f9pqb/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-fkq8r/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-h4dnq/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-j7xgg/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-kc76c/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-krs67/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-v68cj/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-whdsf/debugger
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-nbc5t/debugger
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-s86bq/debugger
  • falco/test-falco-4ttzt/falco
  • falco/test-falco-4ttzt/falcoctl-artifact-follow
  • falco/test-falco-5sbff/falco
  • falco/test-falco-5sbff/falcoctl-artifact-follow
  • falco/test-falco-bw6sg/falco
  • falco/test-falco-bw6sg/falcoctl-artifact-follow
  • falco/test-falco-fm42l/falco
  • falco/test-falco-fm42l/falcoctl-artifact-follow
  • falco/test-falco-hd8g7/falco
  • falco/test-falco-hd8g7/falcoctl-artifact-follow
  • falco/test-falco-k8p25/falco
  • falco/test-falco-k8p25/falcoctl-artifact-follow
  • falco/test-falco-mblws/falco
  • falco/test-falco-mblws/falcoctl-artifact-follow
MEDIUMCWE-306: Ingresses without authentication annotations
8 ingress(es) have no external authentication configured (auth-url, auth-signin, etc).
Affected Resources
  • argo-cd/argo-cd-argocd-server (argo.never-security.sms.dev.sci.scs.sap)
  • burpsuite/bsee-ingress (burpsuite.never-security.sms.dev.sci.scs.sap)
  • nats/test-nats-ws (nats.never-security.sms.dev.sci.scs.sap)
  • nessus-manager/nessus-manager-ui (nessus.never-security.sms.dev.sci.scs.sap)
  • pgadmin4/test-pgadmin4 (pgadmin4.never-security.sms.dev.sci.scs.sap)
  • princess-peach/princess-peach (princess-peach.never-security.sms.dev.sci.scs.sap)
  • splunk/shc-test-ingress (splunk.never-security.sms.dev.sci.scs.sap)
  • tenable-enclave/test-tenable-enclave-tes-operator (tenable-enclave.never-security.sms.dev.sci.scs.sap)
MEDIUMCWE-918: Insufficient network policies to prevent SSRF
Only 1 NetworkPolicy(ies) across 32 namespaces. Pods can reach cloud metadata endpoints (169.254.169.254) and internal services, enabling SSRF attacks.
MEDIUMCWE-770: Containers without resource limits (DoS risk)
103 container(s) have no resource limits. A runaway process could exhaust node resources (Denial of Service).
Affected Resources
  • argo-cd/argo-cd-argocd-dex-server-57589b5c8b-mzjn2/dex-server
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-5dxdb/haproxy
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-62ftz/haproxy
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-8fsl8/haproxy
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-czddh/haproxy
  • argo-cd/argo-cd-redis-ha-server-0/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-0/redis-exporter
  • argo-cd/argo-cd-redis-ha-server-1/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-1/redis-exporter
  • argo-cd/argo-cd-redis-ha-server-2/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-2/redis-exporter
  • cert-manager/cert-manager-cainjector-cf4f94f8c-vjf64/cert-manager-cainjector
  • cert-manager/cert-manager-cainjector-cf4f94f8c-z8mc7/cert-manager-cainjector
  • cert-manager/cert-manager-cd6c7c6b9-2nk6j/cert-manager-controller
  • cert-manager/cert-manager-cd6c7c6b9-k6w8l/cert-manager-controller
  • cert-manager/cert-manager-webhook-6d78ddb474-rp7jd/cert-manager-webhook
  • cert-manager/cert-manager-webhook-6d78ddb474-vzlwx/cert-manager-webhook
  • cert-manager/trust-manager-86c84f6d48-jvqm8/trust-manager
  • cnpg/cnpg-operator-cloudnative-pg-58c485df56-jjlx9/manager
  • default/httpbin-56c54d77b8-9cd8d/httpbin
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-65442/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-7995w/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-f9pqb/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-fkq8r/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-h4dnq/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-j7xgg/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-kc76c/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-krs67/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-v68cj/debugger
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-whdsf/debugger
MEDIUMCWE-639: Majority of pods automount SA tokens
153 pod(s) automount service account tokens. Compromised pods can use the token to impersonate the SA and bypass authorization via the user-controlled token.
Affected Resources
  • (153 pods — list truncated)
INFOCWE-79/CWE-89/CWE-352: Application-layer injection/CSRF weaknesses
XSS, SQL Injection, and CSRF are primarily application-code vulnerabilities. Mitigation: Use WAFs at the ingress layer, keep container images updated, run vulnerability scanners on application code.
INFOCWE-787/CWE-416/CWE-125/CWE-120/CWE-121/CWE-122/CWE-476: Memory safety weaknesses (C/C++ binary vulnerabilities)
Out-of-bounds Write/Read, Use After Free, Buffer Overflows, and NULL Pointer Dereference are binary-level vulnerabilities. Mitigation: Use container image vulnerability scanners (Trivy, Grype) to detect known CVEs in base images. Apply readOnlyRootFilesystem and drop all capabilities to limit exploit impact.
INFOCWE-434: Unrestricted file upload
Applies to web applications allowing file uploads. Mitigation: readOnlyRootFilesystem, ephemeral container storage, and network policies limit post-exploitation impact.
INFONo Trivy VulnerabilityReports found
Trivy Operator may not be running active image scans. Deploy trivy-operator to detect CWE-related CVEs in images.
PASSCWE-89: No database services directly exposed
All database services use ClusterIP (internal only).

🌏 NIST Cybersecurity Framework (CSF) 2.0

Assessment mapped to NIST CSF 2.0 (Feb 2024) — 6 Functions, 22 Categories, 106 Subcategories. 31 High 264 Medium 95 Info 12 findings, 390 affected resources

CSF 2.0 Function Mapping

FunctionIDFocus AreaK8s Controls
GOVERNGVOrganizational context, risk strategy, supply chainKyverno policies, namespace labels, image registries
IDENTIFYIDAsset management, risk assessmentResource inventory, vulnerability scanning
PROTECTPRAccess control, data security, platform securityRBAC, PSA, Secrets, resource limits
DETECTDEContinuous monitoring, adverse eventsFalco, Vector/Splunk logging
RESPONDRSIncident management, analysisNetworkPolicies for containment
RECOVERRCRecovery planningBackup CronJobs, Velero

CSF 2.0 Detailed Findings

12 finding(s)
HIGH PR.PS - Pod Security Standards Not Enforced

31/32 namespaces lack PSA enforce labels

  • argo-cd
  • burpsuite
  • cert-manager
  • cilium-secrets
  • cnpg
  • default
  • delme-i862106
  • external-dns
  • external-secrets
  • falco
  • ingress-nginx
  • k0s-autopilot
  • k0s-system
  • kcm-system
  • kube-node-lease
  • kube-public
  • kube-system
  • kyverno
  • manila-csi
  • nats
MEDIUM GV.OC - Namespaces Lack Organizational Labels

30/32 namespaces missing app.kubernetes.io labels

  • argo-cd
  • burpsuite
  • cert-manager
  • cnpg
  • default
  • delme-i862106
  • external-dns
  • external-secrets
  • falco
  • ingress-nginx
  • k0s-autopilot
  • k0s-system
  • kcm-system
  • kube-node-lease
  • kube-public
  • kube-system
  • kyverno
  • manila-csi
  • nats
  • nessus
MEDIUM GV.RM - Policies in Audit Only

2 policies exist but none enforce

  • cnpg-burpsuite-db-pod-policy
  • kube-env-policy
MEDIUM PR.IR - Containers Without Resource Limits

200 containers lack limits

  • argo-cd/argo-cd-argocd-dex-server-57589b5c8b-mzjn2/dex-server
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-5dxdb/haproxy
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-62ftz/haproxy
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-8fsl8/haproxy
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-czddh/haproxy
  • argo-cd/argo-cd-redis-ha-server-0/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-0/redis-exporter
  • argo-cd/argo-cd-redis-ha-server-1/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-1/redis-exporter
  • argo-cd/argo-cd-redis-ha-server-2/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-2/redis-exporter
  • cert-manager/cert-manager-cainjector-cf4f94f8c-vjf64/cert-manager-cainjector
  • cert-manager/cert-manager-cainjector-cf4f94f8c-z8mc7/cert-manager-cainjector
  • cert-manager/cert-manager-cd6c7c6b9-2nk6j/cert-manager-controller
  • cert-manager/cert-manager-cd6c7c6b9-k6w8l/cert-manager-controller
  • cert-manager/cert-manager-webhook-6d78ddb474-rp7jd/cert-manager-webhook
  • cert-manager/cert-manager-webhook-6d78ddb474-vzlwx/cert-manager-webhook
  • cert-manager/trust-manager-86c84f6d48-jvqm8/trust-manager
  • cnpg/cnpg-operator-cloudnative-pg-58c485df56-jjlx9/manager
  • default/httpbin-56c54d77b8-9cd8d/httpbin
MEDIUM RS.MA - Insufficient Network Isolation

Only 1 NetworkPolicies for containment

  • pgadmin4/test-pgadmin4
MEDIUM RC.RP - No Backup Jobs

No backup/snapshot CronJobs found

INFO GV.SC - Container Image Registries

12 registries: docker.io, ecr-public.aws.com, ghcr.io, global.artifactory.sms.dev.sci.scs.sap, natsio, nginxinc, public.ecr.aws, quay.io, reg.kyverno.io, registry.k8s.io

  • docker.io
  • ecr-public.aws.com
  • ghcr.io
  • global.artifactory.sms.dev.sci.scs.sap
  • natsio
  • nginxinc
  • public.ecr.aws
  • quay.io
  • reg.kyverno.io
  • registry.k8s.io
  • tenable
  • timberio
INFO PR.DS - Secrets Inventory

83 Opaque secrets. Verify encryption at rest.

  • argo-cd/argocd-initial-admin-secret
  • argo-cd/argocd-notifications-secret
  • argo-cd/argocd-redis
  • argo-cd/argocd-repo-creds-ssh-creds
  • argo-cd/argocd-repo-git-repo
  • argo-cd/argocd-repo-keppel-helm-repo
  • argo-cd/argocd-secret
  • argo-cd/cluster-ca-bundle
  • argo-cd/gitlab-kubernetes-migration-repo
  • argo-cd/repo-sci-security
  • burpsuite/bsee-web-server-https
  • burpsuite/burpsuite-db-cnpg-backup-creds
  • burpsuite/cluster-ca-bundle
  • burpsuite/cnpg-burpsuite-db-cluster-ca
  • burpsuite/test-burpsuite-enterprise-server-secret
  • burpsuite/test-burpsuite-relay-shared-secret
  • burpsuite/test-burpsuite-scanning-shared-secret
  • burpsuite/test-burpsuite-web-server-secret
  • cert-manager/cert-manager-webhook-ca
  • cert-manager/cluster-ca-bundle
PASS ID.AM - Asset Inventory

15 nodes, 237 pods, 71 services, 32 namespaces

PASS PR.AA - RBAC Reviewed

No non-system SAs bound to admin roles

PASS DE.CM - Runtime Monitoring Active

Falco on 12 nodes

  • test-falco-4ttzt
  • test-falco-5sbff
  • test-falco-bw6sg
  • test-falco-fm42l
  • test-falco-hd8g7
  • test-falco-k8p25
  • test-falco-mblws
  • test-falco-mq8vw
  • test-falco-qbt4d
  • test-falco-qpfdl
PASS DE.AE - Log Collection Active

11 log collector pods

  • test-vector-aggregator-0
  • test-vector-aggregator-1
  • test-vector-8xrnc
  • test-vector-d5qcn
  • test-vector-hgwf4
  • test-vector-p5kzs
  • test-vector-pnqww
  • test-vector-snnl8
  • test-vector-tdzwm
  • test-vector-tlpwz

📜 NIST SP 800-53 Rev 5

Assessment mapped to NIST SP 800-53 Rev 5 — 20 Control Families, 1000+ Controls. 86 Critical 88 High 214 Medium 84 Info 13 findings, 472 affected resources

Assessed Control Families

FamilyIDControlsK8s Implementation
Access ControlACAC-3, AC-6RBAC, SA tokens, privileged containers
Audit & AccountabilityAUAU-2, AU-3, AU-6Logging, runtime audit (Falco)
Security AssessmentCACA-2PolicyReports, compliance scanning
Config ManagementCMCM-2, CM-7ResourceQuotas, hostNetwork
Identification & AuthIAIA-5Default SA automount
System & Comms ProtectionSCSC-7, SC-8, SC-28NetworkPolicies, TLS, Secrets
System & Info IntegritySISI-2, SI-4Vuln scanning, monitoring

SP 800-53 Detailed Findings

13 finding(s)
CRITICAL AC-6 Least Privilege: Privileged Containers

55 privileged containers

  • falco/test-falco-4ttzt/falco
  • falco/test-falco-5sbff/falco
  • falco/test-falco-bw6sg/falco
  • falco/test-falco-fm42l/falco
  • falco/test-falco-hd8g7/falco
  • falco/test-falco-k8p25/falco
  • falco/test-falco-mblws/falco
  • falco/test-falco-mq8vw/falco
  • falco/test-falco-qbt4d/falco
  • falco/test-falco-qpfdl/falco
  • falco/test-falco-wq5h9/falco
  • falco/test-falco-zqr8t/falco
  • kube-system/csi-nfs-controller-68d68c78cc-jpkcx/nfs
  • kube-system/csi-nfs-controller-68d68c78cc-zxsl5/nfs
  • kube-system/csi-nfs-node-82gkv/nfs
  • kube-system/csi-nfs-node-c98gm/nfs
  • kube-system/csi-nfs-node-cwqs2/nfs
  • kube-system/csi-nfs-node-k9nwv/nfs
  • kube-system/csi-nfs-node-l5t94/nfs
  • kube-system/csi-nfs-node-mmqvl/nfs
CRITICAL SC-7 Boundary Protection: Missing NetworkPolicies

31/32 namespaces lack policies

  • argo-cd
  • burpsuite
  • cert-manager
  • cilium-secrets
  • cnpg
  • default
  • delme-i862106
  • external-dns
  • external-secrets
  • falco
  • ingress-nginx
  • k0s-autopilot
  • k0s-system
  • kcm-system
  • kube-node-lease
  • kube-public
  • kube-system
  • kyverno
  • manila-csi
  • nats
HIGH CM-7 Least Functionality: Host Network

88 pods use hostNetwork

  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-65442
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-7995w
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-f9pqb
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-fkq8r
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-h4dnq
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-j7xgg
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-kc76c
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-krs67
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-v68cj
  • default/node-debugger-never-dev-sec-mdb-fwp85-g5lvc-whdsf
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-nbc5t
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-s86bq
  • kube-system/cilium-7knzf
  • kube-system/cilium-7xhwv
  • kube-system/cilium-bzlvg
  • kube-system/cilium-envoy-69kfp
  • kube-system/cilium-envoy-7llfh
  • kube-system/cilium-envoy-d5chk
  • kube-system/cilium-envoy-ddms4
  • kube-system/cilium-envoy-fzzwc
MEDIUM AC-3 Access Enforcement: SA Token Auto-Mount

153 app pods auto-mount SA tokens

  • argo-cd/argo-cd-argocd-application-controller-0
  • argo-cd/argo-cd-argocd-applicationset-controller-85468f69dc-4mtbb
  • argo-cd/argo-cd-argocd-applicationset-controller-85468f69dc-dxm2c
  • argo-cd/argo-cd-argocd-applicationset-controller-85468f69dc-fd96n
  • argo-cd/argo-cd-argocd-applicationset-controller-85468f69dc-pgs4p
  • argo-cd/argo-cd-argocd-dex-server-57589b5c8b-mzjn2
  • argo-cd/argo-cd-argocd-notifications-controller-6cfc45b4fd-nlcxj
  • argo-cd/argo-cd-argocd-notifications-controller-6cfc45b4fd-vzptq
  • argo-cd/argo-cd-argocd-repo-server-85ff857c68-6fl97
  • argo-cd/argo-cd-argocd-repo-server-85ff857c68-8ds9h
  • argo-cd/argo-cd-argocd-repo-server-85ff857c68-jm4rp
  • argo-cd/argo-cd-argocd-repo-server-85ff857c68-zfzt4
  • argo-cd/argo-cd-argocd-server-59c77858b-5zjvx
  • argo-cd/argo-cd-argocd-server-59c77858b-62qn7
  • argo-cd/argo-cd-argocd-server-59c77858b-ctwn8
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-5dxdb
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-62ftz
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-8fsl8
  • argo-cd/argo-cd-redis-ha-haproxy-5fd56f647d-czddh
  • burpsuite/cnpg-burpsuite-db-cluster-2
MEDIUM CM-2 Baseline Config: No ResourceQuotas

0 ResourceQuotas across 32 namespaces

  • argo-cd
  • burpsuite
  • cert-manager
  • cilium-secrets
  • cnpg
  • default
  • delme-i862106
  • external-dns
  • external-secrets
  • falco
  • ingress-nginx
  • k0s-autopilot
  • k0s-system
  • kcm-system
  • kube-node-lease
  • kube-public
  • kube-system
  • kyverno
  • manila-csi
  • nats
MEDIUM IA-5 Authenticator Mgmt: Default SA Auto-Mount

29 namespaces with default SA automount

  • argo-cd
  • burpsuite
  • cert-manager
  • cilium-secrets
  • cnpg
  • default
  • delme-i862106
  • external-dns
  • external-secrets
  • falco
  • ingress-nginx
  • k0s-autopilot
  • k0s-system
  • kcm-system
  • kyverno
  • manila-csi
  • nats
  • nessus
  • nessus-manager
  • nessus-scanner
INFO AC - RBAC Overview

101 CRBs, 1 admin/cluster-admin

  • cluster-admin
INFO SC-28 Info at Rest: Secrets

83 Opaque secrets. Verify etcd encryption.

PASS AU-2/AU-3 Audit Events: Logging Active

20 log/SIEM pods

  • splunk-cm-test-cluster-manager-0
  • splunk-idxc-test-indexer-0
  • splunk-idxc-test-indexer-1
  • splunk-idxc-test-indexer-2
  • splunk-mc-test-monitoring-console-0
  • splunk-shc-test-deployer-0
  • splunk-shc-test-search-head-0
  • splunk-shc-test-search-head-1
  • splunk-shc-test-search-head-2
  • test-vector-aggregator-0
PASS AU-6 Audit Review: Runtime Security

Falco on 12 nodes

  • test-falco-4ttzt
  • test-falco-5sbff
  • test-falco-bw6sg
  • test-falco-fm42l
  • test-falco-hd8g7
  • test-falco-k8p25
  • test-falco-mblws
  • test-falco-mq8vw
  • test-falco-qbt4d
  • test-falco-qpfdl
PASS CA-2 Security Assessments: Policy Reports

1 ClusterPolicyReports

PASS SC-8 Transmission Confidentiality: TLS OK

All 9 ingresses use TLS

PASS SI-4 System Monitoring: Active

3 monitoring pods

  • hubble-relay-5447cdd779-5n6ht
  • hubble-ui-77d4cd6ff5-2m9js
  • hubble-ui-77d4cd6ff5-lwj4t

⏱ Runtime Security

Live runtime analysis of running workloads, pod health, container states, and security agent status. 5 High 98 Medium 33 Low 54 Info 11 findings, 190 affected resources

Runtime Check Categories

CheckIDDescriptionSeverity
CrashloopingRT01Containers with 5+ restartsHIGH
OOMKilledRT02Containers terminated by OOMHIGH
Pod StateRT03Pods in Failed/Unknown phaseMEDIUM
Image TagsRT04Running :latest or untagged imagesMEDIUM
Health ProbesRT05Missing liveness/readiness probesMEDIUM
EphemeralRT06Active debug containersMEDIUM
Stale PodsRT07Running 90+ days without restartLOW
K8s EventsRT08Warning events in last hourINFO
Pull PolicyRT09IfNotPresent with mutable tagsMEDIUM
Security AgentRT10Falco/Tetragon statusHIGH
Unready PodsRT11Not ready for 5+ minutesMEDIUM
Replica DriftRT12Available < desired replicasMEDIUM

Runtime Security Detailed Findings

11 finding(s)
HIGH Crashlooping Containers

4 container(s) have 5+ restarts, indicating instability or repeated failure

  • burpsuite/cnpg-burpsuite-db-cluster-3/postgres (restarts=16)
  • external-secrets/test-external-secrets-7bf9df4688-ccst9/external-secrets (restarts=25)
  • kube-system/openstack-cloud-controller-manager-dsl24/openstack-cloud-controller-manager (restarts=5)
  • nats/test-nats-ui-nui-0/nui (restarts=14)
HIGH OOMKilled Containers

1 container(s) were recently OOMKilled - possible memory exhaustion

  • kube-system/openstack-cinder-csi-nodeplugin-rxgn9/node-driver-registrar
MEDIUM Mutable Image Tags in Running Pods

3 running container(s) use :latest or no tag

  • burpsuite/ubuntu-change-pvc-permissions-6l62k/ubuntu image=ubuntu:latest
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-nbc5t/debugger image=busybox
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-s86bq/debugger image=ubuntu
MEDIUM Running Containers Without Health Probes

72 running container(s) lack both liveness and readiness probes

  • argo-cd/argo-cd-argocd-applicationset-controller-85468f69dc-4mtbb/applicationset-controller
  • argo-cd/argo-cd-argocd-applicationset-controller-85468f69dc-dxm2c/applicationset-controller
  • argo-cd/argo-cd-argocd-applicationset-controller-85468f69dc-fd96n/applicationset-controller
  • argo-cd/argo-cd-argocd-applicationset-controller-85468f69dc-pgs4p/applicationset-controller
  • argo-cd/argo-cd-argocd-dex-server-57589b5c8b-mzjn2/dex-server
  • argo-cd/argo-cd-argocd-notifications-controller-6cfc45b4fd-nlcxj/notifications-controller
  • argo-cd/argo-cd-argocd-notifications-controller-6cfc45b4fd-vzptq/notifications-controller
  • argo-cd/argo-cd-redis-ha-server-0/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-1/split-brain-fix
  • argo-cd/argo-cd-redis-ha-server-2/split-brain-fix
  • cert-manager/cert-manager-cainjector-cf4f94f8c-vjf64/cert-manager-cainjector
  • cert-manager/cert-manager-cainjector-cf4f94f8c-z8mc7/cert-manager-cainjector
  • default/httpbin-56c54d77b8-9cd8d/httpbin
  • delme-i862106/nginx-fips-667cc48df9-drhn6/nginx-fips
  • external-secrets/test-external-secrets-7bf9df4688-ccst9/external-secrets
  • falco/test-falco-4ttzt/falcoctl-artifact-follow
  • falco/test-falco-5sbff/falcoctl-artifact-follow
  • falco/test-falco-bw6sg/falcoctl-artifact-follow
  • falco/test-falco-fm42l/falcoctl-artifact-follow
  • falco/test-falco-hd8g7/falcoctl-artifact-follow
MEDIUM ImagePullPolicy Mismatch

1 container(s) use IfNotPresent with mutable tags

  • burpsuite/ubuntu-change-pvc-permissions-6l62k/ubuntu tag=latest policy=IfNotPresent
MEDIUM Pods Not Ready for Extended Period

21 pod(s) have been in not-ready state for 5+ minutes

  • burpsuite/cnpg-burpsuite-db-cluster-3 (unready 850m)
  • burpsuite/cnpg-burpsuite-db-cluster-pooler-rw-785d5f97d5-hvmdq (unready 12832m)
  • burpsuite/test-burpsuite-scan-controller-94bbdccbb-gvk7g (unready 10108m)
  • cert-manager/cert-manager-cd6c7c6b9-k6w8l (unready 10108m)
  • cert-manager/cert-manager-webhook-6d78ddb474-vzlwx (unready 10108m)
  • falco/test-falco-hd8g7 (unready 14823m)
  • ingress-nginx/ingress-nginx-controller-6f6f859569-tvfv4 (unready 192m)
  • kube-system/cilium-envoy-j88lg (unready 10108m)
  • kube-system/cilium-n5pl4 (unready 10108m)
  • kube-system/csi-nfs-controller-68d68c78cc-zxsl5 (unready 10108m)
  • kube-system/csi-nfs-node-c98gm (unready 10108m)
  • kube-system/openstack-cinder-csi-nodeplugin-rxgn9 (unready 10108m)
  • kyverno/kyverno-admission-controller-754b69b488-hcw7d (unready 10108m)
  • kyverno/kyverno-background-controller-67f8c8b894-blxss (unready 10108m)
  • kyverno/kyverno-cleanup-controller-6cd48b98bf-78g72 (unready 15950m)
  • kyverno/kyverno-reports-controller-6476c4bd77-jc7mx (unready 10108m)
  • nats/test-nats-ui-nui-0 (unready 55m)
  • splunk/splunk-idxc-test-indexer-0 (unready 21214m)
  • splunk/splunk-idxc-test-indexer-1 (unready 3604m)
  • splunk/splunk-mc-test-monitoring-console-0 (unready 21214m)
MEDIUM Deployment Replica Drift

1 deployment(s) have fewer available replicas than desired

  • pgadmin4/test-pgadmin4 (desired=1, available=0)
LOW Stale Long-Running Pods

33 pod(s) running 90+ days without restart

  • argo-cd/argo-cd-argocd-application-controller-0 (age=129d)
  • argo-cd/argo-cd-argocd-dex-server-57589b5c8b-mzjn2 (age=129d)
  • argo-cd/argo-cd-redis-ha-server-1 (age=129d)
  • k0s-system/k0s-pushgateway-6d8f9785c7-gxdrj (age=129d)
  • kube-system/cilium-envoy-69kfp (age=129d)
  • kube-system/cilium-envoy-7llfh (age=129d)
  • kube-system/cilium-envoy-fzzwc (age=129d)
  • kube-system/cilium-envoy-h4v62 (age=129d)
  • kube-system/cilium-envoy-h66fl (age=129d)
  • kube-system/cilium-envoy-hwb8b (age=129d)
  • kube-system/cilium-envoy-j88lg (age=97d)
  • kube-system/cilium-envoy-kp85x (age=129d)
  • kube-system/cilium-envoy-l4j2g (age=129d)
  • kube-system/cilium-envoy-rtnsv (age=129d)
  • kube-system/cilium-envoy-wgmdf (age=129d)
  • kube-system/cilium-envoy-xkncd (age=129d)
  • kube-system/coredns-c8d757745-65n7g (age=129d)
  • kube-system/coredns-c8d757745-rgq99 (age=129d)
  • kube-system/openstack-cinder-csi-nodeplugin-4l47h (age=129d)
  • kube-system/openstack-cinder-csi-nodeplugin-5ggkt (age=129d)
INFO Recent Warning Events

54 warning event(s) in the last hour

  • argo-cd/argo-cd-argocd-repo-server: FailedGetResourceMetric - failed to get memory utilization: unable to get metrics for resource memory: una
  • argo-cd/argo-cd-argocd-repo-server: FailedGetResourceMetric - failed to get cpu utilization: unable to get metrics for resource cpu: unable to
  • argo-cd/argo-cd-argocd-repo-server: FailedComputeMetricsReplicas - invalid metrics (2 invalid out of 2), first error is: failed to get memory resou
  • argo-cd/argo-cd-argocd-repo-server: FailedGetResourceMetric - failed to get memory utilization: unable to get metrics for resource memory: una
  • argo-cd/argo-cd-argocd-repo-server: FailedGetResourceMetric - failed to get cpu utilization: unable to get metrics for resource cpu: unable to
  • argo-cd/argo-cd-argocd-repo-server: FailedComputeMetricsReplicas - invalid metrics (2 invalid out of 2), first error is: failed to get memory resou
  • argo-cd/argo-cd-argocd-repo-server: FailedGetResourceMetric - failed to get memory utilization: unable to get metrics for resource memory: una
  • argo-cd/argo-cd-argocd-repo-server: FailedGetResourceMetric - failed to get cpu utilization: unable to get metrics for resource cpu: unable to
  • argo-cd/argo-cd-argocd-server: FailedGetResourceMetric - failed to get memory utilization: unable to get metrics for resource memory: una
  • argo-cd/argo-cd-argocd-server: FailedGetResourceMetric - failed to get cpu utilization: unable to get metrics for resource cpu: unable to
  • argo-cd/argo-cd-argocd-server: FailedComputeMetricsReplicas - invalid metrics (2 invalid out of 2), first error is: failed to get memory resou
  • argo-cd/argo-cd-argocd-server: FailedGetResourceMetric - failed to get memory utilization: unable to get metrics for resource memory: una
  • argo-cd/argo-cd-argocd-server: FailedGetResourceMetric - failed to get cpu utilization: unable to get metrics for resource cpu: unable to
  • argo-cd/argo-cd-argocd-server: FailedComputeMetricsReplicas - invalid metrics (2 invalid out of 2), first error is: failed to get memory resou
  • argo-cd/argo-cd-argocd-server: FailedGetResourceMetric - failed to get memory utilization: unable to get metrics for resource memory: una
  • argo-cd/argo-cd-argocd-server: FailedGetResourceMetric - failed to get cpu utilization: unable to get metrics for resource cpu: unable to
  • burpsuite/cnpg-burpsuite-db-cluster-3: Unhealthy - Startup probe failed: HTTP probe failed with statuscode: 500
  • -/never-dev-sec-mdd-r9l6s-tpxjj: ContainerGCFailed - rpc error: code = DeadlineExceeded desc = context deadline exceeded
  • -/never-dev-sec-mdd-r9l6s-tpxjj: ImageGCFailed - rpc error: code = DeadlineExceeded desc = context deadline exceeded
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-nbc5t: FailedToRetrieveImagePullSecret - Unable to retrieve some image pull secrets (chainguard-registry-secret); attempt
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-nbc5t: FailedCreatePodSandBox - Failed to create pod sandbox: rpc error: code = DeadlineExceeded desc = context
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-s86bq: FailedToRetrieveImagePullSecret - Unable to retrieve some image pull secrets (chainguard-registry-secret); attempt
  • default/node-debugger-never-dev-sec-mdd-r9l6s-tpxjj-s86bq: FailedCreatePodSandBox - Failed to create pod sandbox: rpc error: code = DeadlineExceeded desc = context
  • -/pvc-e8e5049c-b3ff-413a-9c0f-4d13c6b88dd7: VolumeFailedDelete - persistentvolume pvc-e8e5049c-b3ff-413a-9c0f-4d13c6b88dd7 is still attached to n
  • ingress-nginx/ingress-nginx-controller-6f6f859569-tvfv4: Unhealthy - Readiness probe failed: Get "http://100.250.1.113:10254/healthz": context deadli
  • ingress-nginx/ingress-nginx-controller: FailedGetResourceMetric - failed to get memory utilization: unable to get metrics for resource memory: una
  • ingress-nginx/ingress-nginx-controller: FailedGetResourceMetric - failed to get cpu utilization: unable to get metrics for resource cpu: unable to
  • ingress-nginx/ingress-nginx-controller: FailedComputeMetricsReplicas - invalid metrics (2 invalid out of 2), first error is: failed to get memory resou
  • ingress-nginx/ingress-nginx-controller: FailedGetResourceMetric - failed to get memory utilization: unable to get metrics for resource memory: una
  • ingress-nginx/ingress-nginx-controller: FailedGetResourceMetric - failed to get cpu utilization: unable to get metrics for resource cpu: unable to
PASS No Ephemeral Containers Detected

No pods have ephemeral debug containers attached

PASS Runtime Security Agent Active

12 Falco pod(s) running