Attackers may try to map the cluster network to get information on the running applications, including scanning for known vulnerabilities. By default, there is no restriction on pods communication in Kubernetes. Therefore, attackers who gain access to a single container, may use it to probe the network.
Check for each namespace if there is a network policy defined.
Define network policies or use similar network protection mechanisms.
apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: test-network-policy namespace: default # we make sure "NetworkPolicy" exists on this namespace
Updated about 2 months ago