Skip to content

readOnlyRootFilesystem needs a higher score than 1 #572

@huornlmj

Description

@huornlmj

Describe the bug
"ReadOnlyRootFilesystem" is currently only awarded a +1 score despite it being one of the most effective mitigations against adversaries. As the official Kubesec documentation states:

"Without a writable filesystem the attack surface is dramatically reduced."

To Reproduce
Steps to reproduce the behaviour:

  1. Create a pod spec that does not use the .securityContext .readOnlyRootFilesystem == true
  2. Scan the pod spec with Kubesec.
  3. Observe it being shown as an advisory with a +1 awarded.

Expected behaviour
The value of this needs to be reevaluated and given a much higher score. I suggest making it comparable to .securityContext .runAsNonRoot == true which currently awards 10 points.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    Status

    To Do

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions