YAML-scanning, AllControls, NSA, MITRE, ArmoBest
Kubernetes networking behavior allows traffic between pods in the cluster as a default behavior. Attackers who gain access to a single container may use it for network reachability to another container in the cluster.
Check for each namespace if there is a network policy defined.
Define Kubernetes network policies or use alternative products to protect cluster network.
Updated about 17 hours ago