From aba21411a9365bbd6a5d09005f5a88390b031d92 Mon Sep 17 00:00:00 2001 From: pyama Date: Thu, 12 Sep 2024 14:54:19 +0900 Subject: [PATCH] fix:Do not output information that contains confidential data. Signed-off-by: Kazuhiko Yamashita --- plugins/k8saudit/rules/k8s_audit_rules.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/k8saudit/rules/k8s_audit_rules.yaml b/plugins/k8saudit/rules/k8s_audit_rules.yaml index 3a1d10b4..bd0f4b56 100644 --- a/plugins/k8saudit/rules/k8s_audit_rules.yaml +++ b/plugins/k8saudit/rules/k8s_audit_rules.yaml @@ -299,7 +299,7 @@ desc: > Detect creating/modifying a configmap containing a private credential (aws key, password, etc.) condition: kevt and configmap and kmodify and contains_private_credentials - output: K8s configmap with private credential (user=%ka.user.name verb=%ka.verb resource=%ka.target.resource configmap=%ka.req.configmap.name config=%ka.req.configmap.obj) + output: K8s configmap with private credential (user=%ka.user.name verb=%ka.verb resource=%ka.target.resource configmap=%ka.req.configmap.name) priority: WARNING source: k8s_audit tags: [k8s]