You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 14, 2020. It is now read-only.
| securityContext.allowPrivilegeEscalation | bool |`false`|Ensures that users privilidges canout be escalated |
42
-
| securityContext.capabilities.drop[0]| string |`"all"`| This drops all linux privilidges from the operator container. They are not required |
43
-
| securityContext.privileged | bool |`false`| Ensures that the operator container is not run in privilidged mode |
41
+
| securityContext.allowPrivilegeEscalation | bool |`false`|Ensure that users privileges cannot be escalated |
42
+
| securityContext.capabilities.drop[0]| string |`"all"`| This drops all linux privileges from the operator container. They are not required |
43
+
| securityContext.privileged | bool |`false`| Ensures that the operator container is not run in privileged mode |
44
44
| securityContext.readOnlyRootFilesystem | bool |`true`| Prevents write access to the containers file system |
45
45
| securityContext.runAsNonRoot | bool |`true`| Enforces that the Operator image is run as a non root user |
46
46
| telemetryEnabled | bool |`true`| The Operator sends anonymous telemetry data, to give the team an overview how much the secureCodeBox is used. Find out more at https://www.securecodebox.io/telemetry|
Copy file name to clipboardExpand all lines: scanners/nmap/README.md
+6-6
Original file line number
Diff line number
Diff line change
@@ -50,10 +50,10 @@ Warning! This is currently not tested and might require additional testing to wo
50
50
51
51
If you want to use Nmap to identify operating systems of hosts you'll need to weaken the securityContext config, as Nmap requires the capability to send raw sockets to identify operating systems. See [Nmap Docs](https://secwiki.org/w/Running_nmap_as_an_unprivileged_user)
52
52
53
-
You can deployed the ScanType with the config like this:
53
+
You can deploy the ScanType with the config like this:
| scannerJob.securityContext | object | `{"allowPrivilegeEscalation":false,"capabilities":{"drop":["all"]},"privileged":false,"readOnlyRootFilesystem":true,"runAsNonRoot":true}` | Optional securityContext set on scanner container (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
101
-
| scannerJob.securityContext.allowPrivilegeEscalation | bool | `false` | Ensures that users privilidges canout be escalated |
102
-
| scannerJob.securityContext.capabilities.drop[0] | string | `"all"` | This drops all linux privilidges from the container. |
103
-
| scannerJob.securityContext.privileged | bool | `false` | Ensures that the scanner container is not run in privilidged mode |
101
+
| scannerJob.securityContext.allowPrivilegeEscalation | bool | `false` | Ensure that users privileges cannot be escalated |
102
+
| scannerJob.securityContext.capabilities.drop[0] | string | `"all"` | This drops all linux privileges from the container. |
103
+
| scannerJob.securityContext.privileged | bool | `false` | Ensures that the scanner container is not run in privileged mode |
104
104
| scannerJob.securityContext.readOnlyRootFilesystem | bool | `true` | Prevents write access to the containers file system |
105
105
| scannerJob.securityContext.runAsNonRoot | bool | `true` | Enforces that the scanner image is run as a non root user |
106
106
| scannerJob.ttlSecondsAfterFinished | string | `nil` | Defines how long the scanner job after finishing will be available (see: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/) |
Copy file name to clipboardExpand all lines: scanners/nmap/README.md.gotmpl
+4-4
Original file line number
Diff line number
Diff line change
@@ -50,10 +50,10 @@ Warning! This is currently not tested and might require additional testing to wo
50
50
51
51
If you want to use Nmap to identify operating systems of hosts you'll need to weaken the securityContext config, as Nmap requires the capability to send raw sockets to identify operating systems. See [Nmap Docs](https://secwiki.org/w/Running_nmap_as_an_unprivileged_user)
52
52
53
-
You can deployed the ScanType with the config like this:
53
+
You can deploy the ScanType with the config like this:
0 commit comments