Vesta is a practical and convenient mirror scan and Docker, Kubernetes baseline security check tool. Dedicated to checking the occurrence of various potential security issues caused by misconfiguration of Docker or Kubernetes.

Vesta v1.0.2 updates are as follows:

new function

  • Add cilium version vulnerability detection
  • Increase the detection of kubelet read-only-port parameters and incorrect use of kubectl proxy
  • Increase the detection of etcd security configuration
  • Increase the detection of RoleBinding security configuration
  • Mirror scanning adds go binary detection

Improve

  • Optimize the method of Layers integration to speed up image scanning

The current list of Kubernetes security check configurations supported by vesta is

SupportedCheck ItemDescriptionSeverity
PrivilegeAllowedDangerous Privileged Modecritical
CapabilitiesDangerous capabilities are setcritical
PV and PVCPV is mounted to sensitive directory and status is activecritical/medium
RBACDangerous configuration of K8s permissionshigh/medium
Kubernetes-dashboardan examination -enable-skip-loginAnd dashboard account permissionscritical/high/low
Kernel version (k8s versions is less than v1.24)There is an escape vulnerability in the current kernel versioncritical
Docker Server version (k8s versions is less than v1.24)There is a vulnerability in the version of Docker Servercritical/high/medium/low
Kubernetes certification expirationThe certificate expiration time is less than 30 daysmedium
ConfigMap and Secret checkWhether there is a weak password in ConfigMap or Secrethigh/medium
Auto Mount Service Account TokenPod is mounted by default /var/run/secrets/kubernetes.io/serviceaccount/token.low
NoResourceLimitsUnlimited usage of resources such as CPU, Memory, Storagelow
Job and CronjobJob or CronJob does not set seccomp or seLinux security policylow
Envoy adminEnvoy admin is configured and listens0.0.0.0.high/medium
CVE-2022-29179Check for the existence of CVE-2022-29179high
Kubelet 10255 and Kubectl proxy10255 port open or Kubectl proxy openhigh/medium/low
Etcd configurationEtcd security configuration checkhigh/medium

At the same time, a general comparison is made for the mirror layer integration method, the article is as follows

Analysis of the mirror scanning method of vesta, trivy and clair

#Vesta #v102 #released #practical #cloudnative #baseline #security #check #tool #News Fast Delivery

Leave a Comment

Your email address will not be published. Required fields are marked *