You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 14, 2020. It is now read-only.
| securityContext.allowPrivilegeEscalation | bool |`false`|Ensures that users privilidges canout be escalated|
42
+
| securityContext.capabilities.drop[0]| string |`"all"`|This drops all linux privilidges from the operator container. They are not required|
43
+
| securityContext.privileged | bool |`false`|Ensures that the operator container is not run in privilidged mode|
44
+
| securityContext.readOnlyRootFilesystem | bool |`true`|Prevents write access to the containers file system|
45
+
| securityContext.runAsNonRoot | bool |`true`|Enforces that the Operator image is run as a non root user|
46
46
| telemetryEnabled | bool |`true`| The Operator sends anonymous telemetry data, to give the team an overview how much the secureCodeBox is used. Find out more at https://www.securecodebox.io/telemetry|
Copy file name to clipboardExpand all lines: scanners/nmap/README.md
+47Lines changed: 47 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,48 @@ Some useful example parameters listed below:
42
42
-`-script` xx: Replace xx with the script name. Start the scan with the given script.
43
43
-`--script` xx: Replace xx with a coma-separated list of scripts. Start the scan with the given scripts.
44
44
45
+
## Operating System Scans
46
+
47
+
:::caution
48
+
Warning! This is currently not tested and might require additional testing to work 😕
49
+
:::
50
+
51
+
If you want to use Nmap to identify operating systems of hosts you'll need to weaken the securityContext config, as Nmap requires the capability to send raw sockets to identify operating systems. See [Nmap Docs](https://secwiki.org/w/Running_nmap_as_an_unprivileged_user)
52
+
53
+
You can deployed the ScanType with the config like this:
| scannerJob.securityContext.allowPrivilegeEscalation | bool | `false` | Ensures that users privilidges canout be escalated |
99
+
| scannerJob.securityContext.capabilities.drop[0] | string | `"all"` | This drops all linux privilidges from the container. |
100
+
| scannerJob.securityContext.privileged | bool | `false` | Ensures that the scanner container is not run in privilidged mode |
101
+
| scannerJob.securityContext.readOnlyRootFilesystem | bool | `true` | Prevents write access to the containers file system |
102
+
| scannerJob.securityContext.runAsNonRoot | bool | `true` | Enforces that the scanner image is run as a non root user |
56
103
| scannerJob.ttlSecondsAfterFinished | string | `nil` | Defines how long the scanner job after finishing will be available (see: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/) |
0 commit comments