Skip to content
This repository was archived by the owner on Oct 14, 2020. It is now read-only.

Commit ca6d41e

Browse files
J12934actions-user
authored andcommitted
Updating Helm Docs
1 parent 4b7a172 commit ca6d41e

File tree

2 files changed

+52
-5
lines changed

2 files changed

+52
-5
lines changed

operator/README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,10 @@ helm install securecodebox-operator secureCodeBox/operator
3838
| s3.port | string | `nil` | |
3939
| s3.secretAttributeNames.accesskey | string | `"accesskey"` | |
4040
| s3.secretAttributeNames.secretkey | string | `"secretkey"` | |
41-
| securityContext.allowPrivilegeEscalation | bool | `false` | |
42-
| securityContext.capabilities.drop[0] | string | `"all"` | |
43-
| securityContext.privileged | bool | `false` | |
44-
| securityContext.readOnlyRootFilesystem | bool | `true` | |
45-
| securityContext.runAsNonRoot | bool | `true` | |
41+
| securityContext.allowPrivilegeEscalation | bool | `false` | Ensures that users privilidges canout be escalated |
42+
| securityContext.capabilities.drop[0] | string | `"all"` | This drops all linux privilidges from the operator container. They are not required |
43+
| securityContext.privileged | bool | `false` | Ensures that the operator container is not run in privilidged mode |
44+
| securityContext.readOnlyRootFilesystem | bool | `true` | Prevents write access to the containers file system |
45+
| securityContext.runAsNonRoot | bool | `true` | Enforces that the Operator image is run as a non root user |
4646
| telemetryEnabled | bool | `true` | The Operator sends anonymous telemetry data, to give the team an overview how much the secureCodeBox is used. Find out more at https://www.securecodebox.io/telemetry |
4747

scanners/nmap/README.md

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,48 @@ Some useful example parameters listed below:
4242
- `-script` xx: Replace xx with the script name. Start the scan with the given script.
4343
- `--script` xx: Replace xx with a coma-separated list of scripts. Start the scan with the given scripts.
4444

45+
## Operating System Scans
46+
47+
:::caution
48+
Warning! This is currently not tested and might require additional testing to work 😕
49+
:::
50+
51+
If you want to use Nmap to identify operating systems of hosts you'll need to weaken the securityContext config, as Nmap requires the capability to send raw sockets to identify operating systems. See [Nmap Docs](https://secwiki.org/w/Running_nmap_as_an_unprivileged_user)
52+
53+
You can deployed the ScanType with the config like this:
54+
55+
```bash
56+
cat <<EOF | helm install nmap-privilidged ./scanners/nmap --values -
57+
scannerJob:
58+
env:
59+
- name: "NMAP_PRIVILEGED"
60+
value: "true"
61+
securityContext:
62+
capabilities:
63+
drop:
64+
- all
65+
add:
66+
- CAP_NET_RAW
67+
- CAP_NET_ADMIN
68+
- CAP_NET_BIND_SERVICE
69+
EOF
70+
```
71+
72+
You the start scans with operating system identification enabled:
73+
74+
```yaml
75+
apiVersion: "execution.experimental.securecodebox.io/v1"
76+
kind: Scan
77+
metadata:
78+
name: "nmap-os-scan"
79+
spec:
80+
scanType: "nmap-privilidged"
81+
parameters:
82+
- --privileged
83+
- "-O"
84+
- www.iteratec.de
85+
```
86+
4587
## Chart Configuration
4688
4789
| Key | Type | Default | Description |
@@ -53,4 +95,9 @@ Some useful example parameters listed below:
5395
| scannerJob.extraVolumeMounts | list | `[]` | Optional VolumeMounts mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
5496
| scannerJob.extraVolumes | list | `[]` | Optional Volumes mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
5597
| scannerJob.resources | object | `{}` | CPU/memory resource requests/limits (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-memory-resource/, https://kubernetes.io/docs/tasks/configure-pod-container/assign-cpu-resource/) |
98+
| scannerJob.securityContext.allowPrivilegeEscalation | bool | `false` | Ensures that users privilidges canout be escalated |
99+
| scannerJob.securityContext.capabilities.drop[0] | string | `"all"` | This drops all linux privilidges from the container. |
100+
| scannerJob.securityContext.privileged | bool | `false` | Ensures that the scanner container is not run in privilidged mode |
101+
| scannerJob.securityContext.readOnlyRootFilesystem | bool | `true` | Prevents write access to the containers file system |
102+
| scannerJob.securityContext.runAsNonRoot | bool | `true` | Enforces that the scanner image is run as a non root user |
56103
| scannerJob.ttlSecondsAfterFinished | string | `nil` | Defines how long the scanner job after finishing will be available (see: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/) |

0 commit comments

Comments
 (0)