Skip to content

Commit

Permalink
Merge pull request #618 from kubescape/rm-armobuiltin
Browse files Browse the repository at this point in the history
remove armoBuiltin attribute
  • Loading branch information
YiscahLevySilas1 committed Apr 21, 2024
2 parents 7f4ba54 + 6f60b06 commit e3f1133
Show file tree
Hide file tree
Showing 13 changed files with 10 additions and 33 deletions.
4 changes: 1 addition & 3 deletions frameworks/__YAMLscan.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
{
"name": "YAML-scanning",
"description": "Controls relevant to yamls",
"attributes": {
"armoBuiltin": true
},
"attributes": {},
"scanningScope": {
"matches": [
"file"
Expand Down
4 changes: 1 addition & 3 deletions frameworks/allcontrols.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
{
"name": "AllControls",
"description": "Contains all the controls from all the frameworks",
"attributes": {
"armoBuiltin": true
},
"attributes": {},
"scanningScope": {
"matches": [
"cluster",
Expand Down
4 changes: 1 addition & 3 deletions frameworks/armobest.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
{
"name": "ArmoBest",
"description": "",
"attributes": {
"armoBuiltin": true
},
"attributes": {},
"scanningScope": {
"matches": [
"cluster",
Expand Down
1 change: 0 additions & 1 deletion frameworks/cis-aks-t1.2.0.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@
"name": "cis-aks-t1.2.0",
"description": "Testing CIS for Azure Kubernetes Service (AKS) as suggested by CIS benchmark: https://workbench.cisecurity.org/benchmarks/9058",
"attributes": {
"armoBuiltin": true,
"version": "v1.2.0"
},
"scanningScope": {
Expand Down
1 change: 0 additions & 1 deletion frameworks/cis-eks-t1.2.0.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@
"name": "cis-eks-t1.2.0",
"description": "Testing CIS for Amazon Elastic Kubernetes Service (EKS) as suggested by CIS benchmark: https://workbench.cisecurity.org/benchmarks/9681",
"attributes": {
"armoBuiltin": true,
"version": "v1.2.0"
},
"scanningScope": {
Expand Down
1 change: 0 additions & 1 deletion frameworks/cis-v1.23-t1.0.1.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@
"name": "cis-v1.23-t1.0.1",
"description": "Testing CIS for Kubernetes as suggested by CIS in https://workbench.cisecurity.org/benchmarks/8973",
"attributes": {
"armoBuiltin": true,
"version": "v1.0.1"
},
"scanningScope": {
Expand Down
4 changes: 1 addition & 3 deletions frameworks/clusterscan.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
{
"name": "ClusterScan",
"description": "Framework for scanning a cluster",
"attributes": {
"armoBuiltin": true
},
"attributes": {},
"typeTags": [
"security"
],
Expand Down
4 changes: 1 addition & 3 deletions frameworks/devopsbest.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
{
"name": "DevOpsBest",
"description": "",
"attributes": {
"armoBuiltin": true
},
"attributes": {},
"scanningScope": {
"matches": [
"cluster",
Expand Down
4 changes: 1 addition & 3 deletions frameworks/mitre.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
{
"name": "MITRE",
"description": "Testing MITRE for Kubernetes as suggested by microsoft in https://www.microsoft.com/security/blog/wp-content/uploads/2020/04/k8s-matrix.png",
"attributes": {
"armoBuiltin": true
},
"attributes": {},
"scanningScope": {
"matches": [
"cluster",
Expand Down
4 changes: 1 addition & 3 deletions frameworks/nsaframework.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
{
"name": "NSA",
"description": "Implement NSA security advices for K8s ",
"attributes": {
"armoBuiltin": true
},
"attributes": {},
"scanningScope": {
"matches": [
"cluster",
Expand Down
4 changes: 1 addition & 3 deletions frameworks/security.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
{
"name": "security",
"description": "Controls that are used to assess security threats.",
"attributes": {
"armoBuiltin": true
},
"attributes": {},
"typeTags": [
"security"
],
Expand Down
4 changes: 1 addition & 3 deletions frameworks/soc2.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
{
"name": "SOC2",
"description": "SOC2 compliance related controls",
"attributes": {
"armoBuiltin": true
},
"attributes": {},
"scanningScope": {
"matches": [
"cluster",
Expand Down
4 changes: 1 addition & 3 deletions frameworks/workloadscan.json
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
{
"name": "WorkloadScan",
"description": "Framework for scanning a workload",
"attributes": {
"armoBuiltin": true
},
"attributes": {},
"typeTags": [
"security"
],
Expand Down

0 comments on commit e3f1133

Please sign in to comment.