Describe the bug
"ReadOnlyRootFilesystem" is currently only awarded a +1 score despite it being one of the most effective mitigations against adversaries. As the official Kubesec documentation states:
"Without a writable filesystem the attack surface is dramatically reduced."
To Reproduce
Steps to reproduce the behaviour:
- Create a pod spec that does not use the .securityContext .readOnlyRootFilesystem == true
- Scan the pod spec with Kubesec.
- Observe it being shown as an advisory with a +1 awarded.
Expected behaviour
The value of this needs to be reevaluated and given a much higher score. I suggest making it comparable to .securityContext .runAsNonRoot == true which currently awards 10 points.
Describe the bug
"ReadOnlyRootFilesystem" is currently only awarded a +1 score despite it being one of the most effective mitigations against adversaries. As the official Kubesec documentation states:
To Reproduce
Steps to reproduce the behaviour:
Expected behaviour
The value of this needs to be reevaluated and given a much higher score. I suggest making it comparable to .securityContext .runAsNonRoot == true which currently awards 10 points.