Skip to content
This repository has been archived by the owner on Sep 27, 2024. It is now read-only.

configure precommit ci #13

Merged
merged 5 commits into from
Dec 22, 2023
Merged

configure precommit ci #13

merged 5 commits into from
Dec 22, 2023

Conversation

bushong1
Copy link
Contributor

@bushong1 bushong1 commented Dec 21, 2023

Fixes Issue: configure-precommit-ci

Description:

Security Impact Analysis Questionnaire

Submitter Checklist

  • Is there an impact on Auditing and Logging procedures or capabilities?
  • Is there an impact on Authentication procedures or capabilities?
  • Is there an impact on Authorization procedures or capabilities?
  • Is there an impact on Communication Security procedures or capabilities?
  • Is there an impact on Cryptography procedures or capabilities?
  • Is there an impact on Sensitive Data procedures or capabilities?
  • Is there an impact on any other security-related procedures or capabilities?
  • No security impacts identified.

Security Risks Identified - For any applicable items on the "Submitter Checklist," describe the impact of the change and any implemented mitigations.

@bushong1 bushong1 self-assigned this Dec 21, 2023
@bushong1 bushong1 requested a review from a team December 21, 2023 18:43
@robo-gotham
Copy link

robo-gotham commented Dec 21, 2023

Snyk Scanning for Commit: c80523f

Snyk Infrastructure as Code

  • Snyk testing Infrastructure as Code configuration issues.
    ✔ Test completed.

Issues

Medium Severity Issues: 3

[Medium] Container or Pod is running without root user control
Info: Container or Pod is running without root user control. Container or
Pod could be running with full administrative privileges
Rule: https://security.snyk.io/rules/cloud/SNYK-CC-K8S-10
Path: [DocId: 0] > input > spec > template > spec > containers[inflate] >
securityContext > runAsNonRoot
File: test/test.yaml
Resolve: Set securityContext.runAsNonRoot to true

[Medium] Container does not drop all default capabilities
Info: All default capabilities are not explicitly dropped. Containers are
running with potentially unnecessary privileges
Rule: https://security.snyk.io/rules/cloud/SNYK-CC-K8S-6
Path: [DocId: 0] > input > spec > template > spec > containers[inflate] >
securityContext > capabilities > drop
File: test/test.yaml
Resolve: Add ALL to securityContext.capabilities.drop list, and add only
required capabilities in securityContext.capabilities.add

[Medium] Container is running without privilege escalation control
Info: allowPrivilegeEscalation attribute is not set to false. Processes
could elevate current privileges via known vectors, for example SUID
binaries
Rule: https://security.snyk.io/rules/cloud/SNYK-CC-K8S-9
Path: [DocId: 0] > spec > template > spec > containers[inflate] >
securityContext > allowPrivilegeEscalation
File: test/test.yaml
Resolve: Set spec.{containers, initContainers}.securityContext.allowPrivilegeEscalation to false


Test Summary

Organization: batcave-ispg
Project name: CMS-Enterprise/batcave-tf-karpenter

✔ Files without issues: 8
✗ Files with issues: 1
Ignored issues: 0
Total issues: 3 [ 0 critical, 0 high, 3 medium, 0 low ]


Report Complete

Your test results are available at: https://snyk.io/org/batcave-ispg/projects
under the name: CMS-Enterprise/batcave-tf-karpenter

@bushong1 bushong1 merged commit 6fe0677 into main Dec 22, 2023
1 check passed
@bushong1 bushong1 deleted the configure-precommit-ci branch December 22, 2023 16:37
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants