KICS #265
Annotations
10 warnings
charts/policy-hub/templates/deployment-hub.yaml#L39
Check if containers are running with low UID, which might cause conflicts with the host's user table.
|
charts/policy-hub/templates/deployment-hub.yaml#L39
Containers should be configured with a secure Seccomp profile to restrict potentially dangerous syscalls
|
charts/policy-hub/templates/deployment-hub.yaml#L38
Service Account Tokens are automatically mounted even if not necessary
|
charts/policy-hub/templates/deployment-hub.yaml#L32
Deployments should be assigned with a PodDisruptionBudget to ensure high availability
|
charts/policy-hub/templates/deployment-hub.yaml#L39
Image Pull Policy of the container must be defined and set to Always
|
charts/policy-hub/templates/deployment-hub.yaml#L39
Images should be specified together with their digests to ensure integrity
|
charts/policy-hub/templates/deployment-hub.yaml#L35
Containers should be configured with an AppArmor profile to enforce fine-grained access control over low-level system resources
|
charts/policy-hub/templates/deployment-hub.yaml#L20
Each namespace should have a LimitRange policy associated to ensure that resource allocations of Pods, Containers and PersistentVolumeClaims do not exceed the defined boundaries
|
charts/policy-hub/templates/deployment-hub.yaml#L20
Each namespace should have a ResourceQuota policy associated to limit the total amount of resources Pods, Containers and PersistentVolumeClaims can consume
|
charts/policy-hub/templates/deployment-hub.yaml#L65
Container should not use secrets as environment variables
|
This job succeeded
Loading