Ensure Kubernetes Network policy attached to a pod have Ingress/Egress blocks specified

MEDIUM

Description

If no Ingress/Egress is defined for all pods in a namespace then there is a high chance of unauthorized workloads communicating the pods of other namespace.

Remediation

To ensure outside malicious traffic is not allowed to connect to pods of a particular namespace. It is recommended to configure a NetworkPolicy, use 'podSelector:matchLabels' to attach it to pods, and include 'policyType:Ingress/Egress' for the same NetworkPolicy.

Policy Details

Rule Reference ID: AC_K8S_0116
Remediation Available: No
Resource Category: Virtual Network
Resource Type: Network Policies

Frameworks