MITRE, ArmoBest, NSA, YAML-scanning, AllControls
Kubernetes networking behavior allows traffic between pods in the cluster as a default behavior. Attackers who gain access to a single container may use it for network reachability to another container in the cluster.
Check for each namespace if there is a network policy defined.
Define Kubernetes network policies or use alternative products to protect cluster network.
Updated about 2 months ago