Information
The security posture dashboard provides insights about your workload security posture at the runtime phase of the software delivery life-cycle.
Solution
To enable Security Posture for a new cluster, be sure to add --security-posture=standard or --security-posture=enterprise when creating.
To update Security Posture for an existing cluster, run the following command:
gcloud container clusters update CLUSTER_NAME \\
--location=CONTROL_PLANE_LOCATION \\
--security-posture=standard
Replace the following:
- CLUSTER_NAME: the name of your cluster.
- CONTROL_PLANE_LOCATION: the location of the control plane of your cluster. Provide a region for regional Standard and Autopilot clusters, or a zone for zonal Standard clusters.
For console users follow the numbered steps in the console tab using the link provided: Enable configuration auditing on an existing cluster https://cloud.google.com/kubernetes-engine/docs/how-to/protect-workload-configuration#console
Impact:
GKE security posture configuration auditing checks your workloads against a set of defined best practices. Each configuration check has its own impact or risk. Learn more about the checks: About Kubernetes security posture scanning https://cloud.google.com/kubernetes-engine/docs/concepts/about-configuration-scanning and Automatically audit workloads for configuration issues https://cloud.google.com/kubernetes-engine/docs/how-to/protect-workload-configuration
Example: The host namespace check identifies pods that share host namespaces. Pods that share host namespaces allow Pod processes to communicate with host processes and gather host information, which could lead to a container escape