Security Audit

Overview

Krust includes a built-in security audit engine that scans your cluster resources against common best-practice checks. Results are presented in a single view with severity levels and actionable recommendations.

How to Use

Navigate to the Security Audit tab in the sidebar. Krust runs all checks automatically against the current cluster context. Findings are grouped by category and can be filtered by severity.

Check Categories

Pod Security

Checks related to pod-level security configuration.

CheckSeverityDescription
Privileged containersCriticalContainers running with privileged: true
Host PID / Network / IPCCriticalPods sharing host namespaces
Run as rootHighContainers running as UID 0 or without runAsNonRoot: true
Read-only root filesystemMediumContainers without readOnlyRootFilesystem: true
Privilege escalationHighContainers without allowPrivilegeEscalation: false
Capability dropsMediumContainers that do not drop ALL capabilities

Image Security

Checks related to container image hygiene.

CheckSeverityDescription
Latest tagHighImages using the :latest tag or no tag at all
Image pull policyMediumContainers without imagePullPolicy: Always when using mutable tags
No digest pinningLowImages not pinned to a specific digest (@sha256:...)

Resource Limits

Checks for missing or misconfigured resource requests and limits.

CheckSeverityDescription
Missing CPU requestsMediumContainers without CPU resource requests
Missing memory requestsMediumContainers without memory resource requests
Missing CPU limitsMediumContainers without CPU resource limits
Missing memory limitsHighContainers without memory limits risk OOM-killing other workloads

Node Health

Checks related to node-level conditions and configuration.

CheckSeverityDescription
Not Ready nodesCriticalNodes in NotReady condition
Disk pressureHighNodes reporting DiskPressure condition
Memory pressureHighNodes reporting MemoryPressure condition
PID pressureMediumNodes reporting PIDPressure condition
UnschedulableMediumNodes cordoned or marked unschedulable

RBAC Permissions

Checks for overly broad RBAC policies.

CheckSeverityDescription
Wildcard verbsCriticalRoles or ClusterRoles granting * verbs
Wildcard resourcesCriticalRoles or ClusterRoles granting access to * resources
Secrets accessHighRoles granting get, list, or watch on secrets
Cluster-admin bindingCriticalClusterRoleBindings referencing the cluster-admin role

Service Account

Checks related to service account configuration.

CheckSeverityDescription
Default service accountMediumPods using the default service account
Auto-mounted tokenMediumService accounts with automountServiceAccountToken: true when not needed

Severity Levels

LevelMeaning
CriticalImmediate security risk that should be addressed urgently
HighSignificant security concern that could lead to exploitation
MediumBest-practice violation that weakens security posture
LowMinor improvement opportunity for defense in depth