-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Support more granular policy selectors #3441
Comments
@chen-keinan - I would also like to hear your thoughts on this, any suggestions or improvements to what is currently drafted? |
@simar7 it will be great to define the known suggested selectors per each
|
@itaysk - can you link the previously stated document you mentioned here which has the historical context for this issue? |
the example looked like this:
|
we should add to acceptance criteria that this should replace the "resource" that cloud scanning uses |
@simar7 @giorod3 IIUC aquasecurity/defsec#1174 doesn't fully implement this issue, and it's not included in the milestone. Should we
|
This issue is stale because it has been labeled with inactivity. |
ping @simar7 |
As of today and this PR aquasecurity/defsec#1174, selectors are available for usage in cloud policies. For kubernetes (and docker as well) the basic framework exists but the policies themselves need to implement using selectors. We should open another issue that specifically targets those two.
We can add this as a separate issue as well, this would be more of a chore than a feature. More details with context here aquasecurity/defsec#1174 (comment) |
User Story
As a: Trivy misconfiguration scanning user,
I would like to: see pass or fail for only those policies which are relevant,
So that: I don't see passes for those policies that don't apply to my configuration.
What exists today
What is desired
Note the extra
input.selector.resource
annotation that specifies apod
as a resource.In such a case, this policy would only be evaluated if a k8s scan for
Pod
was run. In other words, it will not be evaluated if onlyDeploymentSet
orStatefulSet
were under scan.Acceptance Criteria
PASS
. Instead they should not be evaluated and not be counted in the results.Signed-off-by: Simar [email protected]
The text was updated successfully, but these errors were encountered: