mirror of
https://github.com/aquasecurity/kube-bench.git
synced 2024-11-15 20:39:08 +00:00
Add example IAM policy
This commit is contained in:
parent
c3f94dd89f
commit
6bbbd53054
19
docs/asff.md
19
docs/asff.md
@ -18,6 +18,23 @@ You can configure kube-bench with the `--asff` to send findings to AWS Security
|
||||
* Grant these permissions to the IAM Role that the kube-bench pod will be associated with. There are two potions:
|
||||
* You can run the kube-bench pod under a specific [service account associated with an IAM role](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) that has these permissions to write Security Hub findings.
|
||||
* Alternatively the pod can be granted permissions specified by the Role that your [EKS node group uses](https://docs.aws.amazon.com/eks/latest/userguide/managed-node-groups.html).
|
||||
|
||||
Here is an example IAM Policy that you can attach to your EKS node group's IAM Role:
|
||||
|
||||
```json
|
||||
{
|
||||
"Version": "2012-10-17",
|
||||
"Statement": [
|
||||
{
|
||||
"Effect": "Allow",
|
||||
"Action": "securityhub:BatchImportFindings",
|
||||
"Resource": [
|
||||
"arn:aws:securityhub:us-east-1::product/aqua-security/kube-bench"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
## Configure and rebuild kube-bench
|
||||
|
||||
@ -36,4 +53,4 @@ Findings will be generated for any kube-bench test that generates a `[FAIL]` or
|
||||
<img src="../images/asff-example-finding.png">
|
||||
</p>
|
||||
|
||||
[eks-instructions]: ../README.md#running-in-an-EKS-cluster
|
||||
[eks-instructions]: ../README.md#running-in-an-EKS-cluster
|
||||
|
Loading…
Reference in New Issue
Block a user