Description

Kasten’s K10 Data Management Platform

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
aggregatedapis-svcdefault421Critical
auth-svcdefault171Critical
catalog-svcdefault152Critical
crypto-svcdefault194Critical
frontend-svcdefault131Critical
gatewaydefault131Critical
jobs-svcdefault141Critical
k10-kube-state-metricsdefault321Critical
logging-svcdefault131Critical
metering-svcdefault181Critical
state-svcdefault182Critical
prometheus-serverdefault122Medium
controllermanager-svcdefault01
dashboardbff-svcdefault02
executor-svcdefault01
k10-alertmanagerdefault01
k10-prometheus-node-exporterdefault01
k10-prometheus-pushgatewaydefault01
kanister-svcdefault01

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 aggregatedapis-svc

Namespace: default  |  Automount:

🔑 Permissions (42)

RoleResourceVerbsRiskTags
ClusterRole kasten-aggregatedapis-svc*list · watchCriticalClusterStructure ClusterWideAccess ClusterWideSecretAccess ConfigMapAccess CredentialAccess (+12 more)
Role kasten-admin**CriticalAvailabilityImpact BindingToPrivilegedRole CodeExecution ConfigMapAccess ControlPlaneDisruption (+40 more)
ClusterRole kasten-aggregatedapis-svccore/secrets*CriticalClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more)
ClusterRole kasten-svc-adminactions.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminapps.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminauth.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminconfig.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admincr.kanister.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindatamover.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindist.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindr.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminkasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminreporting.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminrepositories.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminvault.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-aggregatedapis-svcauthorization.k8s.io/subjectaccessreviewscreate · updateMediumInformationDisclosure RBACQuery
ClusterRole kasten-aggregatedapis-svcapiregistration.k8s.io/apiservicescreate · updateLow
ClusterRole kasten-aggregatedapis-svccore/configmapsget · listLow
ClusterRole kasten-aggregatedapis-svcapiextensions.k8s.io/customresourcedefinitionslistLow
ClusterRole kasten-aggregatedapis-svcapps.openshift.io/deploymentconfigsget · listLow
ClusterRole kasten-aggregatedapis-svcapps/deploymentsget · listLow
ClusterRole kasten-aggregatedapis-svcnetworking.k8s.io/ingresseslistLow
ClusterRole kasten-aggregatedapis-svccore/namespacesget · listLow
Role kasten-defaultcore/namespacesgetLow
ClusterRole kasten-aggregatedapis-svccore/nodeslistLow
ClusterRole kasten-aggregatedapis-svccore/persistentvolumeclaimsget · listLow
ClusterRole kasten-aggregatedapis-svccore/persistentvolumescreate · get · list · updateLow
ClusterRole kasten-aggregatedapis-svccore/podslistLow
ClusterRole kasten-aggregatedapis-svcnetworking.k8s.aws/policyendpointslistLow
ClusterRole kasten-aggregatedapis-svcapps/replicasetslistLow
ClusterRole kasten-aggregatedapis-svccore/replicationcontrollerslistLow
ClusterRole kasten-aggregatedapis-svcrbac.authorization.k8s.io/rolebindingscreate · updateLow
ClusterRole kasten-aggregatedapis-svcvpcresources.k8s.aws/securitygrouppolicieslistLow
ClusterRole kasten-aggregatedapis-svcauthorization.k8s.io/selfsubjectaccessreviewscreate · updateLow
ClusterRole kasten-aggregatedapis-svccore/serviceslistLow
ClusterRole kasten-aggregatedapis-svcapps/statefulsetsget · listLow
ClusterRole kasten-aggregatedapis-svcstorage.k8s.io/storageclassesgetLow
ClusterRole kasten-aggregatedapis-svckubevirt.io/virtualmachineinstancesgetLow
ClusterRole kasten-aggregatedapis-svckubevirt.io/virtualmachinesget · listLow
ClusterRole kasten-aggregatedapis-svcsnapshot.storage.k8s.io/volumesnapshotclassescreate · get · updateLow
ClusterRole kasten-aggregatedapis-svcsnapshot.storage.k8s.io/volumesnapshotcontentscreate · get · updateLow
ClusterRole kasten-aggregatedapis-svcsnapshot.storage.k8s.io/volumesnapshotslistLow

⚠️ Potential Abuse (52)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentaggregatedapis-svcaggregatedapis-svcgcr.io/kasten-images/aggregatedapis:8.5.1

🤖 k10-kube-state-metrics

Namespace: default  |  Automount:

🔑 Permissions (32)

RoleResourceVerbsRiskTags
ClusterRole k10-kube-state-metricscore/secretslist · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole k10-kube-state-metricscore/configmapslist · watchHighConfigMapAccess DataExposure InformationDisclosure
ClusterRole k10-kube-state-metricsadmissionregistration.k8s.io/mutatingwebhookconfigurationslist · watchMediumInformationDisclosure Reconnaissance WebhookReconnaissance
ClusterRole k10-kube-state-metricscore/resourcequotaslist · watchMediumInformationDisclosure QuotaTampering Reconnaissance ResourceConfiguration
ClusterRole k10-kube-state-metricsadmissionregistration.k8s.io/validatingwebhookconfigurationslist · watchMediumInformationDisclosure Reconnaissance WebhookReconnaissance
ClusterRole k10-kube-state-metricscertificates.k8s.io/certificatesigningrequestslist · watchLow
ClusterRole k10-kube-state-metricsbatch/cronjobslist · watchLow
ClusterRole k10-kube-state-metricsapps/daemonsetslist · watchLow
ClusterRole k10-kube-state-metricsextensions/daemonsetslist · watchLow
ClusterRole k10-kube-state-metricsapps/deploymentslist · watchLow
ClusterRole k10-kube-state-metricsextensions/deploymentslist · watchLow
ClusterRole k10-kube-state-metricscore/endpointslist · watchLow
ClusterRole k10-kube-state-metricsautoscaling/horizontalpodautoscalerslist · watchLow
ClusterRole k10-kube-state-metricsextensions/ingresseslist · watchLow
ClusterRole k10-kube-state-metricsnetworking.k8s.io/ingresseslist · watchLow
ClusterRole k10-kube-state-metricsbatch/jobslist · watchLow
ClusterRole k10-kube-state-metricscoordination.k8s.io/leaseslist · watchLow
ClusterRole k10-kube-state-metricscore/limitrangeslist · watchLowInformationDisclosure Reconnaissance ResourceConfiguration
ClusterRole k10-kube-state-metricscore/namespaceslist · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole k10-kube-state-metricsnetworking.k8s.io/networkpolicieslist · watchLow
ClusterRole k10-kube-state-metricscore/nodeslist · watchLow
ClusterRole k10-kube-state-metricscore/persistentvolumeclaimslist · watchLow
ClusterRole k10-kube-state-metricscore/persistentvolumeslist · watchLow
ClusterRole k10-kube-state-metricspolicy/poddisruptionbudgetslist · watchLow
ClusterRole k10-kube-state-metricscore/podslist · watchLow
ClusterRole k10-kube-state-metricsapps/replicasetslist · watchLow
ClusterRole k10-kube-state-metricsextensions/replicasetslist · watchLow
ClusterRole k10-kube-state-metricscore/replicationcontrollerslist · watchLow
ClusterRole k10-kube-state-metricscore/serviceslist · watchLow
ClusterRole k10-kube-state-metricsapps/statefulsetslist · watchLow
ClusterRole k10-kube-state-metricsstorage.k8s.io/storageclasseslist · watchLow
ClusterRole k10-kube-state-metricsstorage.k8s.io/volumeattachmentslist · watchLow

⚠️ Potential Abuse (11)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentk10-kube-state-metricskube-state-metricsregistry.k8s.io/kube-state-metrics/kube-state-metrics:v2.15.0

🤖 crypto-svc

Namespace: default  |  Automount:

🔑 Permissions (19)

RoleResourceVerbsRiskTags
Role kasten-admin**CriticalAvailabilityImpact BindingToPrivilegedRole CodeExecution ConfigMapAccess ControlPlaneDisruption (+40 more)
ClusterRole kasten-svc-adminactions.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminapps.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminauth.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminconfig.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admincr.kanister.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindatamover.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindist.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindr.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminkasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminreporting.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminrepositories.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminvault.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-crypto-svccore/namespaceslistLow
Role kasten-defaultcore/namespacesgetLow
ClusterRole kasten-crypto-svccore/nodesgetLow
ClusterRole kasten-crypto-svccore/persistentvolumesdelete · listLow
ClusterRole kasten-crypto-svcsnapshot.storage.k8s.io/volumesnapshotcontentsdeleteLow
ClusterRole kasten-crypto-svcsnapshot.storage.k8s.io/volumesnapshotslistLow

⚠️ Potential Abuse (41)

The following security risks were found based on the above permissions:

📦 Workloads (4)

KindNameContainerImage
Deploymentcrypto-svcbloblifecyclemanager-svcgcr.io/kasten-images/bloblifecyclemanager:8.5.1
Deploymentcrypto-svccrypto-svcgcr.io/kasten-images/crypto:8.5.1
Deploymentcrypto-svcgarbagecollector-svcgcr.io/kasten-images/garbagecollector:8.5.1
Deploymentcrypto-svcrepositories-svcgcr.io/kasten-images/repositories:8.5.1

🤖 metering-svc

Namespace: default  |  Automount:

🔑 Permissions (18)

RoleResourceVerbsRiskTags
Role kasten-admin**CriticalAvailabilityImpact BindingToPrivilegedRole CodeExecution ConfigMapAccess ControlPlaneDisruption (+40 more)
ClusterRole kasten-svc-adminactions.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminapps.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminauth.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminconfig.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admincr.kanister.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindatamover.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindist.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindr.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminkasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminreporting.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminrepositories.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminvault.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-metering-svccore/namespaceslistLow
Role kasten-defaultcore/namespacesgetLow
ClusterRole kasten-metering-svccore/nodeslistLow
ClusterRole kasten-metering-svccore/persistentvolumeclaimslist · watchLow
ClusterRole kasten-metering-svcstorage.k8s.io/storageclasseslistLow

⚠️ Potential Abuse (41)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentmetering-svcmetering-svcgcr.io/kasten-images/metering:8.5.1

🤖 state-svc

Namespace: default  |  Automount:

🔑 Permissions (18)

RoleResourceVerbsRiskTags
Role kasten-admin**CriticalAvailabilityImpact BindingToPrivilegedRole CodeExecution ConfigMapAccess ControlPlaneDisruption (+40 more)
ClusterRole kasten-svc-adminactions.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminapps.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminauth.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminconfig.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admincr.kanister.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindatamover.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindist.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindr.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminkasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminreporting.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminrepositories.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminvault.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-state-svcapps.openshift.io/deploymentconfigslist · watchLow
ClusterRole kasten-state-svcapps/deploymentslist · watchLow
ClusterRole kasten-state-svccore/namespaceslist · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole kasten-state-svcapps/statefulsetslist · watchLow
ClusterRole kasten-state-svckubevirt.io/virtualmachineslist · watchLow

⚠️ Potential Abuse (42)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Deploymentstate-svcevents-svcgcr.io/kasten-images/events:8.5.1
Deploymentstate-svcstate-svcgcr.io/kasten-images/state:8.5.1

🤖 auth-svc

Namespace: default  |  Automount:

🔑 Permissions (17)

RoleResourceVerbsRiskTags
Role kasten-admin**CriticalAvailabilityImpact BindingToPrivilegedRole CodeExecution ConfigMapAccess ControlPlaneDisruption (+40 more)
ClusterRole kasten-auth-svccore/secretscreate · get · list · update · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole kasten-svc-adminactions.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminapps.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminauth.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminconfig.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admincr.kanister.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindatamover.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindist.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindr.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminkasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminreporting.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminrepositories.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminvault.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-auth-svcauthentication.k8s.io/tokenreviewscreate · updateMediumCredentialAccess InformationDisclosure RBACQuery
Role kasten-defaultcore/namespacesgetLow
ClusterRole kasten-auth-svccore/serviceaccounts/tokencreate · updateLow

⚠️ Potential Abuse (43)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentauth-svcauth-svcgcr.io/kasten-images/auth:8.5.1

🤖 catalog-svc

Namespace: default  |  Automount:

🔑 Permissions (15)

RoleResourceVerbsRiskTags
Role kasten-admin**CriticalAvailabilityImpact BindingToPrivilegedRole CodeExecution ConfigMapAccess ControlPlaneDisruption (+40 more)
ClusterRole kasten-svc-adminactions.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminapps.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminauth.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminconfig.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admincr.kanister.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindatamover.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindist.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindr.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminkasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminreporting.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminrepositories.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminvault.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-catalog-svccore/namespaceslistLow
Role kasten-defaultcore/namespacesgetLow

⚠️ Potential Abuse (41)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Deploymentcatalog-svccatalog-svcgcr.io/kasten-images/catalog:8.5.1
Deploymentcatalog-svckanister-sidecargcr.io/kasten-images/kanister-tools:8.5.1

🤖 jobs-svc

Namespace: default  |  Automount:

🔑 Permissions (14)

RoleResourceVerbsRiskTags
Role kasten-admin**CriticalAvailabilityImpact BindingToPrivilegedRole CodeExecution ConfigMapAccess ControlPlaneDisruption (+40 more)
ClusterRole kasten-svc-adminactions.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminapps.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminauth.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminconfig.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admincr.kanister.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindatamover.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindist.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindr.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminkasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminreporting.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminrepositories.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminvault.kio.kasten.io/**HighClusterWideAccess WildcardPermission
Role kasten-defaultcore/namespacesgetLow

⚠️ Potential Abuse (41)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentjobs-svcjobs-svcgcr.io/kasten-images/jobs:8.5.1

🤖 frontend-svc

Namespace: default  |  Automount:

🔑 Permissions (13)

RoleResourceVerbsRiskTags
Role kasten-admin**CriticalAvailabilityImpact BindingToPrivilegedRole CodeExecution ConfigMapAccess ControlPlaneDisruption (+40 more)
ClusterRole kasten-svc-adminactions.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminapps.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminauth.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminconfig.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admincr.kanister.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindatamover.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindist.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindr.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminkasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminreporting.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminrepositories.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminvault.kio.kasten.io/**HighClusterWideAccess WildcardPermission

⚠️ Potential Abuse (40)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentfrontend-svcfrontend-svcgcr.io/kasten-images/frontend:8.5.1

🤖 gateway

Namespace: default  |  Automount:

🔑 Permissions (13)

RoleResourceVerbsRiskTags
Role kasten-admin**CriticalAvailabilityImpact BindingToPrivilegedRole CodeExecution ConfigMapAccess ControlPlaneDisruption (+40 more)
ClusterRole kasten-svc-adminactions.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminapps.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminauth.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminconfig.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admincr.kanister.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindatamover.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindist.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindr.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminkasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminreporting.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminrepositories.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminvault.kio.kasten.io/**HighClusterWideAccess WildcardPermission

⚠️ Potential Abuse (40)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentgatewaygatewaygcr.io/kasten-images/gateway:8.5.1

🤖 logging-svc

Namespace: default  |  Automount:

🔑 Permissions (13)

RoleResourceVerbsRiskTags
Role kasten-admin**CriticalAvailabilityImpact BindingToPrivilegedRole CodeExecution ConfigMapAccess ControlPlaneDisruption (+40 more)
ClusterRole kasten-svc-adminactions.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminapps.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminauth.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminconfig.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admincr.kanister.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindatamover.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindist.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-admindr.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminkasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminreporting.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminrepositories.kio.kasten.io/**HighClusterWideAccess WildcardPermission
ClusterRole kasten-svc-adminvault.kio.kasten.io/**HighClusterWideAccess WildcardPermission

⚠️ Potential Abuse (40)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentlogging-svclogging-svcgcr.io/kasten-images/logging:8.5.1

🤖 prometheus-server

Namespace: default  |  Automount:

🔑 Permissions (12)

RoleResourceVerbsRiskTags
Role k10-prometheus-servercore/configmapsget · list · watchMediumConfigMapAccess DataExposure InformationDisclosure
Role k10-prometheus-servercore/endpointsget · list · watchLow
Role k10-prometheus-servercore/ingressesget · list · watchLow
Role k10-prometheus-serverextensions/ingressesget · list · watchLow
Role k10-prometheus-servernetworking.k8s.io/ingressesget · list · watchLow
Role k10-prometheus-serverextensions/ingresses/statusget · list · watchLow
Role k10-prometheus-servernetworking.k8s.io/ingresses/statusget · list · watchLow
Role k10-prometheus-servercore/nodesget · list · watchLow
Role k10-prometheus-servercore/nodes/metricsget · list · watchLow
Role k10-prometheus-servercore/nodes/proxyget · list · watchLow
Role k10-prometheus-servercore/podsget · list · watchLow
Role k10-prometheus-servercore/servicesget · list · watchLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Deploymentprometheus-serverprometheus-servergcr.io/kasten-images/prometheus:8.5.1
Deploymentprometheus-serverprometheus-server-configmap-reloadgcr.io/kasten-images/configmap-reload:8.5.1

🤖 controllermanager-svc

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentcontrollermanager-svccontrollermanager-svcgcr.io/kasten-images/controllermanager:8.5.1

🤖 dashboardbff-svc

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (2)

KindNameContainerImage
Deploymentdashboardbff-svcdashboardbff-svcgcr.io/kasten-images/dashboardbff:8.5.1
Deploymentdashboardbff-svcvbrintegrationapi-svcgcr.io/kasten-images/vbrintegrationapi:8.5.1

🤖 executor-svc

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentexecutor-svcexecutor-svcgcr.io/kasten-images/executor:8.5.1

🤖 k10-alertmanager

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
StatefulSetk10-alertmanageralertmanagerquay.io/prometheus/alertmanager:v0.28.1

🤖 k10-prometheus-node-exporter

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
DaemonSetk10-prometheus-node-exporternode-exporterquay.io/prometheus/node-exporter:v1.9.1

🤖 k10-prometheus-pushgateway

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentk10-prometheus-pushgatewaypushgatewayquay.io/prometheus/pushgateway:v1.11.1

🤖 kanister-svc

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentkanister-svckanister-svcgcr.io/kasten-images/kanister:8.5.1