Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 5cb34b5

Browse files
authoredJun 4, 2024··
Merge pull request #627 from kubescape/builtin-att
add builtin attribute to fw
2 parents d2c245c + d01a7f7 commit 5cb34b5

13 files changed

+36
-13
lines changed
 

‎frameworks/__YAMLscan.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
{
22
"name": "YAML-scanning",
33
"description": "Controls relevant to yamls",
4-
"attributes": {},
4+
"attributes": {
5+
"builtin": true
6+
},
57
"scanningScope": {
68
"matches": [
79
"file"

‎frameworks/allcontrols.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
{
22
"name": "AllControls",
33
"description": "Contains all the controls from all the frameworks",
4-
"attributes": {},
4+
"attributes": {
5+
"builtin": true
6+
},
57
"scanningScope": {
68
"matches": [
79
"cluster",

‎frameworks/armobest.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
{
22
"name": "ArmoBest",
33
"description": "",
4-
"attributes": {},
4+
"attributes": {
5+
"builtin": true
6+
},
57
"scanningScope": {
68
"matches": [
79
"cluster",

‎frameworks/cis-aks-t1.2.0.json

+2-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
"name": "cis-aks-t1.2.0",
33
"description": "Testing CIS for Azure Kubernetes Service (AKS) as suggested by CIS benchmark: https://workbench.cisecurity.org/benchmarks/9058",
44
"attributes": {
5-
"version": "v1.2.0"
5+
"version": "v1.2.0",
6+
"builtin": true
67
},
78
"scanningScope": {
89
"matches": [

‎frameworks/cis-eks-t1.2.0.json

+2-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
"name": "cis-eks-t1.2.0",
33
"description": "Testing CIS for Amazon Elastic Kubernetes Service (EKS) as suggested by CIS benchmark: https://workbench.cisecurity.org/benchmarks/9681",
44
"attributes": {
5-
"version": "v1.2.0"
5+
"version": "v1.2.0",
6+
"builtin": true
67
},
78
"scanningScope": {
89
"matches": [

‎frameworks/cis-v1.23-t1.0.1.json

+2-1
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
"name": "cis-v1.23-t1.0.1",
33
"description": "Testing CIS for Kubernetes as suggested by CIS in https://workbench.cisecurity.org/benchmarks/8973",
44
"attributes": {
5-
"version": "v1.0.1"
5+
"version": "v1.0.1",
6+
"builtin": true
67
},
78
"scanningScope": {
89
"matches": [

‎frameworks/clusterscan.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
{
22
"name": "ClusterScan",
33
"description": "Framework for scanning a cluster",
4-
"attributes": {},
4+
"attributes": {
5+
"builtin": true
6+
},
57
"typeTags": [
68
"security"
79
],

‎frameworks/devopsbest.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
{
22
"name": "DevOpsBest",
33
"description": "",
4-
"attributes": {},
4+
"attributes": {
5+
"builtin": true
6+
},
57
"scanningScope": {
68
"matches": [
79
"cluster",

‎frameworks/mitre.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
{
22
"name": "MITRE",
33
"description": "Testing MITRE for Kubernetes as suggested by microsoft in https://www.microsoft.com/security/blog/wp-content/uploads/2020/04/k8s-matrix.png",
4-
"attributes": {},
4+
"attributes": {
5+
"builtin": true
6+
},
57
"scanningScope": {
68
"matches": [
79
"cluster",

‎frameworks/nsaframework.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
{
22
"name": "NSA",
33
"description": "Implement NSA security advices for K8s ",
4-
"attributes": {},
4+
"attributes": {
5+
"builtin": true
6+
},
57
"scanningScope": {
68
"matches": [
79
"cluster",

‎frameworks/security.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
{
22
"name": "security",
33
"description": "Controls that are used to assess security threats.",
4-
"attributes": {},
4+
"attributes": {
5+
"builtin": true
6+
},
57
"typeTags": [
68
"security"
79
],

‎frameworks/soc2.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
{
22
"name": "SOC2",
33
"description": "SOC2 compliance related controls",
4-
"attributes": {},
4+
"attributes": {
5+
"builtin": true
6+
},
57
"scanningScope": {
68
"matches": [
79
"cluster",

‎frameworks/workloadscan.json

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
{
22
"name": "WorkloadScan",
33
"description": "Framework for scanning a workload",
4-
"attributes": {},
4+
"attributes": {
5+
"builtin": true
6+
},
57
"typeTags": [
68
"security"
79
],

0 commit comments

Comments
 (0)
Please sign in to comment.