Skip to content
This repository has been archived by the owner on Oct 30, 2024. It is now read-only.

Latest commit

 

History

History
114 lines (90 loc) · 3.26 KB

asat.md

File metadata and controls

114 lines (90 loc) · 3.26 KB

automountServiceAccountToken Auditor (asat)

Finds containers that meet either of the following conditions:

  1. The deprecated serviceAccount field is used
  2. The default service account is automatically mounted

General Usage

kubeaudit asat [flags]

See Global Flags

Examples

kubeaudit asat -f "auditors/asat/fixtures/service-account-token-true-and-no-name.yml"

---------------- Results for ---------------

  apiVersion: v1
  kind: ReplicationController
  metadata:
    name: replicationcontroller
    namespace: service-account-token-true-and-no-name

--------------------------------------------

-- [error] AutomountServiceAccountTokenTrueAndDefaultSA
   Message: Default service account with token mounted. automountServiceAccountToken should be set to 'false' on either the ServiceAccount or on the PodSpec or a non-default service account should be used.

Explanation

serviceAccount is a deprecated field. serviceAccountName should be used instead.

Example of a resource which fails the asat check because it uses serviceAccount:

apiVersion: v1
kind: Deployment
spec:
  template:
    spec:
      serviceAccount: ThisFieldIsDeprecated
      containers:
      - name: myContainer

Automounting a default service account would allow any compromised pod to run API commands against the cluster. Either automounting should be disabled or a non-default service account with sane permissions should be used.

To make sure a non-default service account is used, serviceAccountName must be set to a value other than default.

To make sure a service account is not automatically mounted, automountServiceAccountToken must be explicitly set to false (it defaults to true) on either the ServiceAccount (for kubernetes 1.6+) or on the PodSpec.

Example of disabling automountServiceAccountToken on the default ServiceAccount (kubernetes 1.6+):

apiVersion: v1
kind: ServiceAccount
metadata:
  name: default
automountServiceAccountToken: false

Example of disabling automountServiceAccountToken on the PodSpec of a Deployment:

apiVersion: v1
kind: Deployment
spec:
  template:
    spec:
      automountServiceAccountToken: false
      containers:
      - name: myContainer

Note that if automountServiceAccountToken is set on the PodSpec, this will take precedence over automountServiceAccountToken set on the ServiceAccount, so you should never set automountServiceAccountToken: true in the PodSpec when using the default ServiceAccount.

Example of using a non-default service account:

apiVersion: v1
kind: Deployment
spec:
  template:
    spec:
      serviceAccountName: customServiceAccount
      containers:
      - name: myContainer

Override Errors

First, see the Introduction to Override Errors.

Override identifier: allow-automount-service-account-token

Only pod overrides are supported:

kubeaudit.io/allow-automount-service-account-token: ""

Example of a resource with asat results overridden:

apiVersion: apps/v1
kind: Deployment
spec:
  template:
    metadata:
      labels:
        kubeaudit.io/allow-automount-service-account-token: ""
    spec:
      automountServiceAccountToken: true
      containers:
      - name: myContainer