# Number of resources found as part of NSA control Immutable container filesystem
kubescape_resources_found_count{framework="NSA",control="Immutable container filesystem"} 22
# Number of resources excluded as part of NSA control Immutable container filesystem
kubescape_resources_excluded_count{framework="NSA",control="Immutable container filesystem"} 0
# Number of resources failed as part of NSA control Immutable container filesystem
kubescape_resources_failed_count{framework="NSA",control="Immutable container filesystem"} 21
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of NSA control Privileged container
kubescape_resources_found_count{framework="NSA",control="Privileged container"} 22
# Number of resources excluded as part of NSA control Privileged container
kubescape_resources_excluded_count{framework="NSA",control="Privileged container"} 0
# Number of resources failed as part of NSA control Privileged container
kubescape_resources_failed_count{framework="NSA",control="Privileged container"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of NSA control Allowed hostPath
kubescape_resources_found_count{framework="NSA",control="Allowed hostPath"} 22
# Number of resources excluded as part of NSA control Allowed hostPath
kubescape_resources_excluded_count{framework="NSA",control="Allowed hostPath"} 0
# Number of resources failed as part of NSA control Allowed hostPath
kubescape_resources_failed_count{framework="NSA",control="Allowed hostPath"} 7
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Number of resources found as part of NSA control Automatic mapping of service account
kubescape_resources_found_count{framework="NSA",control="Automatic mapping of service account"} 47
# Number of resources excluded as part of NSA control Automatic mapping of service account
kubescape_resources_excluded_count{framework="NSA",control="Automatic mapping of service account"} 0
# Number of resources failed as part of NSA control Automatic mapping of service account
kubescape_resources_failed_count{framework="NSA",control="Automatic mapping of service account"} 47
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="armo-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="cyberarmor-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="default",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-node-lease",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-public",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="bootstrap-signer",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="resourcequota-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="job-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="service-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="token-cleaner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="namespace-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="endpointslice-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="node-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="pv-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="attachdetach-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="replication-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="service-account-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="ttl-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="coredns",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="deployment-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="disruption-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="endpoint-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="replicaset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="certificate-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="cronjob-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="statefulset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="daemon-set-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="expand-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="nginx-ingress",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="v1/ServiceAccount"} 1
# Number of resources found as part of NSA control hostNetwork access
kubescape_resources_found_count{framework="NSA",control="hostNetwork access"} 22
# Number of resources excluded as part of NSA control hostNetwork access
kubescape_resources_excluded_count{framework="NSA",control="hostNetwork access"} 0
# Number of resources failed as part of NSA control hostNetwork access
kubescape_resources_failed_count{framework="NSA",control="hostNetwork access"} 6
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of NSA control Resource policies
kubescape_resources_found_count{framework="NSA",control="Resource policies"} 22
# Number of resources excluded as part of NSA control Resource policies
kubescape_resources_excluded_count{framework="NSA",control="Resource policies"} 0
# Number of resources failed as part of NSA control Resource policies
kubescape_resources_failed_count{framework="NSA",control="Resource policies"} 9
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of NSA control Allow privilege escalation
kubescape_resources_found_count{framework="NSA",control="Allow privilege escalation"} 22
# Number of resources excluded as part of NSA control Allow privilege escalation
kubescape_resources_excluded_count{framework="NSA",control="Allow privilege escalation"} 0
# Number of resources failed as part of NSA control Allow privilege escalation
kubescape_resources_failed_count{framework="NSA",control="Allow privilege escalation"} 21
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of NSA control Applications credentials in configuration files
kubescape_resources_found_count{framework="NSA",control="Applications credentials in configuration files"} 44
# Number of resources excluded as part of NSA control Applications credentials in configuration files
kubescape_resources_excluded_count{framework="NSA",control="Applications credentials in configuration files"} 0
# Number of resources failed as part of NSA control Applications credentials in configuration files
kubescape_resources_failed_count{framework="NSA",control="Applications credentials in configuration files"} 8
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="armo-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="default",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-node-lease",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-public",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="nginx-ingress",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="extension-apiserver-authentication",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="armo-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="armo-system",name="armo-kubescape-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="armo-system",name="armo-scan-scheduler-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-nginx-ingress-deployment-nginx-ingress",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-posture-score-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="default",name="kubescape",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-public",name="cluster-info",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="coredns",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="kubeadm-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="kubelet-config-1.22",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="nginx-ingress",name="ingress-controller-leader-nginx",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Number of resources found as part of NSA control Cluster-admin binding
kubescape_resources_found_count{framework="NSA",control="Cluster-admin binding"} 74
# Number of resources excluded as part of NSA control Cluster-admin binding
kubescape_resources_excluded_count{framework="NSA",control="Cluster-admin binding"} 0
# Number of resources failed as part of NSA control Cluster-admin binding
kubescape_resources_failed_count{framework="NSA",control="Cluster-admin binding"} 4
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Number of resources found as part of NSA control Exec into container
kubescape_resources_found_count{framework="NSA",control="Exec into container"} 74
# Number of resources excluded as part of NSA control Exec into container
kubescape_resources_excluded_count{framework="NSA",control="Exec into container"} 0
# Number of resources failed as part of NSA control Exec into container
kubescape_resources_failed_count{framework="NSA",control="Exec into container"} 4
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Number of resources found as part of NSA control Insecure capabilities
kubescape_resources_found_count{framework="NSA",control="Insecure capabilities"} 22
# Number of resources excluded as part of NSA control Insecure capabilities
kubescape_resources_excluded_count{framework="NSA",control="Insecure capabilities"} 0
# Number of resources failed as part of NSA control Insecure capabilities
kubescape_resources_failed_count{framework="NSA",control="Insecure capabilities"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Number of resources found as part of NSA control Linux hardening
kubescape_resources_found_count{framework="NSA",control="Linux hardening"} 22
# Number of resources excluded as part of NSA control Linux hardening
kubescape_resources_excluded_count{framework="NSA",control="Linux hardening"} 0
# Number of resources failed as part of NSA control Linux hardening
kubescape_resources_failed_count{framework="NSA",control="Linux hardening"} 17
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Number of resources found as part of NSA control Ingress and Egress blocked
kubescape_resources_found_count{framework="NSA",control="Ingress and Egress blocked"} 22
# Number of resources excluded as part of NSA control Ingress and Egress blocked
kubescape_resources_excluded_count{framework="NSA",control="Ingress and Egress blocked"} 0
# Number of resources failed as part of NSA control Ingress and Egress blocked
kubescape_resources_failed_count{framework="NSA",control="Ingress and Egress blocked"} 22
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Number of resources found as part of NSA control Network policies
kubescape_resources_found_count{framework="NSA",control="Network policies"} 7
# Number of resources excluded as part of NSA control Network policies
kubescape_resources_excluded_count{framework="NSA",control="Network policies"} 0
# Number of resources failed as part of NSA control Network policies
kubescape_resources_failed_count{framework="NSA",control="Network policies"} 7
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="armo-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="cyberarmor-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="default",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="kube-node-lease",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="kube-public",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="kube-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="nginx-ingress",groupVersionKind="v1/Namespace"} 1
# Number of resources found as part of NSA control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_found_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 36
# Number of resources excluded as part of NSA control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_excluded_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 0
# Number of resources failed as part of NSA control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="coredns",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="extension-apiserver-authentication",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kubeadm-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kubelet-config-1.22",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="ingress-controller-leader-nginx",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-kubescape-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-scan-scheduler-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-nginx-ingress-deployment-nginx-ingress",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-posture-score-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="default",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="default",name="kubescape",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-node-lease",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-public",name="cluster-info",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-public",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Number of resources found as part of MITRE control Access container service account
kubescape_resources_found_count{framework="MITRE",control="Access container service account"} 216
# Number of resources excluded as part of MITRE control Access container service account
kubescape_resources_excluded_count{framework="MITRE",control="Access container service account"} 0
# Number of resources failed as part of MITRE control Access container service account
kubescape_resources_failed_count{framework="MITRE",control="Access container service account"} 31
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system:persistent-volume-provisioner",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system:persistent-volume-provisioner",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:node-proxier",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="nginx-ingress-roles",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="armo-kubescape-service-account-roles",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:persistent-volume-provisioner",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="armo-scanner-service-account-roles",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="ca-controller-roles",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:coredns",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="armo-kubescape-service-account-role-binding",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="storage-provisioner",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="armo-scanner-service-account-role-binding",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="ca-controller-role-binding",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:coredns",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="kubeadm:node-proxier",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="nginx-ingress-roles-binding",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:service-account-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:volume-scheduler",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:daemon-set-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:node-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:persistent-volume-binder",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:pod-garbage-collector",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:resourcequota-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:root-ca-cert-publisher",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:kube-aggregator",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:aggregate-to-admin",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:certificates.k8s.io:legacy-unknown-approver",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:service-account-issuer-discovery",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="edit",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:certificates.k8s.io:certificatesigningrequests:selfnodeclient",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:horizontal-pod-autoscaler",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:discovery",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:certificates.k8s.io:kube-apiserver-client-approver",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:certificate-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:replication-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:heapster",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:attachdetach-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:clusterrole-aggregation-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:endpointslice-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:endpointslicemirroring-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:node-problem-detector",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="kubeadm:get-nodes",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:certificates.k8s.io:kubelet-serving-approver",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:ephemeral-volume-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:kube-dns",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:disruption-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:expand-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:pvc-protection-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="cluster-admin",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:aggregate-to-edit",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:basic-user",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:cronjob-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:service-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:kubelet-api-admin",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="view",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:deployment-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:endpoint-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:pv-protection-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:aggregate-to-view",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:job-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:replicaset-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:node-bootstrapper",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:auth-delegator",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:certificates.k8s.io:certificatesigningrequests:nodeclient",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:namespace-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:statefulset-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="admin",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:certificates.k8s.io:kube-apiserver-client-kubelet-approver",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:ttl-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:node",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:generic-garbage-collector",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:route-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:public-info-viewer",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:ttl-after-finished-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="armo-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="default",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-node-lease",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-public",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="node-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="token-cleaner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="attachdetach-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="daemon-set-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="endpointslice-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="service-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="ttl-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="namespace-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="resourcequota-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="service-account-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="bootstrap-signer",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="certificate-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="coredns",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="statefulset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="cronjob-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="expand-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="job-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="pv-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="replicaset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="replication-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="deployment-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="disruption-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="endpoint-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="nginx-ingress",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-public",name="kubeadm:bootstrap-signer-clusterinfo",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-public",name="system:controller:bootstrap-signer",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kubeadm:kubelet-config-1.22",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kubeadm:nodes-kubeadm-config",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system::leader-locking-kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system:controller:cloud-provider",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system:controller:token-cleaner",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kube-proxy",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system::extension-apiserver-authentication-reader",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system::leader-locking-kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system:controller:bootstrap-signer",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:endpointslice-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:ephemeral-volume-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:replication-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:root-ca-cert-publisher",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="kubeadm:node-autoapprove-bootstrap",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="minikube-rbac",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:clusterrole-aggregation-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:job-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:replicaset-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:service-account-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:public-info-viewer",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:disruption-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:generic-garbage-collector",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:horizontal-pod-autoscaler",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:pod-garbage-collector",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:statefulset-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:ttl-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:kube-dns",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:endpoint-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:namespace-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:node-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:node",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:volume-scheduler",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:route-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:service-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="cluster-admin",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:certificate-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:persistent-volume-binder",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:attachdetach-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:endpointslicemirroring-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:expand-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:ttl-after-finished-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="kubeadm:kubelet-bootstrap",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="kubeadm:node-autoapprove-certificate-rotation",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:basic-user",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:deployment-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:resourcequota-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:pv-protection-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:pvc-protection-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:discovery",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:node-proxier",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:service-account-issuer-discovery",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="kubeadm:get-nodes",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:cronjob-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:controller:daemon-set-controller",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system::leader-locking-kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system:controller:bootstrap-signer",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="extension-apiserver-authentication-reader",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kube-proxy",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kubeadm:kubelet-config-1.22",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kubeadm:nodes-kubeadm-config",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system::leader-locking-kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system:controller:cloud-provider",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system:controller:token-cleaner",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-public",name="kubeadm:bootstrap-signer-clusterinfo",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-public",name="system:controller:bootstrap-signer",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Number of resources found as part of MITRE control Applications credentials in configuration files
kubescape_resources_found_count{framework="MITRE",control="Applications credentials in configuration files"} 44
# Number of resources excluded as part of MITRE control Applications credentials in configuration files
kubescape_resources_excluded_count{framework="MITRE",control="Applications credentials in configuration files"} 0
# Number of resources failed as part of MITRE control Applications credentials in configuration files
kubescape_resources_failed_count{framework="MITRE",control="Applications credentials in configuration files"} 8
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="armo-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="default",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-node-lease",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-public",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="nginx-ingress",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="extension-apiserver-authentication",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="kubelet-config-1.22",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="coredns",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="kubeadm-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="nginx-ingress",name="ingress-controller-leader-nginx",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="armo-system",name="armo-kubescape-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="armo-system",name="armo-scan-scheduler-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="armo-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-nginx-ingress-deployment-nginx-ingress",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-posture-score-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="default",name="kubescape",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-public",name="cluster-info",groupVersionKind="v1/ConfigMap"} 1
# Number of resources found as part of MITRE control Cluster-admin binding
kubescape_resources_found_count{framework="MITRE",control="Cluster-admin binding"} 74
# Number of resources excluded as part of MITRE control Cluster-admin binding
kubescape_resources_excluded_count{framework="MITRE",control="Cluster-admin binding"} 0
# Number of resources failed as part of MITRE control Cluster-admin binding
kubescape_resources_failed_count{framework="MITRE",control="Cluster-admin binding"} 4
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Number of resources found as part of MITRE control Cluster internal networking
kubescape_resources_found_count{framework="MITRE",control="Cluster internal networking"} 7
# Number of resources excluded as part of MITRE control Cluster internal networking
kubescape_resources_excluded_count{framework="MITRE",control="Cluster internal networking"} 0
# Number of resources failed as part of MITRE control Cluster internal networking
kubescape_resources_failed_count{framework="MITRE",control="Cluster internal networking"} 7
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="kube-node-lease",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="kube-public",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="kube-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="nginx-ingress",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="armo-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="cyberarmor-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="default",groupVersionKind="v1/Namespace"} 1
# Number of resources found as part of MITRE control Exec into container
kubescape_resources_found_count{framework="MITRE",control="Exec into container"} 74
# Number of resources excluded as part of MITRE control Exec into container
kubescape_resources_excluded_count{framework="MITRE",control="Exec into container"} 0
# Number of resources failed as part of MITRE control Exec into container
kubescape_resources_failed_count{framework="MITRE",control="Exec into container"} 4
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Number of resources found as part of MITRE control hostPath mount
kubescape_resources_found_count{framework="MITRE",control="hostPath mount"} 22
# Number of resources excluded as part of MITRE control hostPath mount
kubescape_resources_excluded_count{framework="MITRE",control="hostPath mount"} 0
# Number of resources failed as part of MITRE control hostPath mount
kubescape_resources_failed_count{framework="MITRE",control="hostPath mount"} 7
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Number of resources found as part of MITRE control Kubernetes CronJob
kubescape_resources_found_count{framework="MITRE",control="Kubernetes CronJob"} 2
# Number of resources excluded as part of MITRE control Kubernetes CronJob
kubescape_resources_excluded_count{framework="MITRE",control="Kubernetes CronJob"} 0
# Number of resources failed as part of MITRE control Kubernetes CronJob
kubescape_resources_failed_count{framework="MITRE",control="Kubernetes CronJob"} 2
# Failed object from "MITRE" control "Kubernetes CronJob"
kubescape_object_failed_count{framework="MITRE",control="Kubernetes CronJob",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Kubernetes CronJob"
kubescape_object_failed_count{framework="MITRE",control="Kubernetes CronJob",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of MITRE control List Kubernetes secrets
kubescape_resources_found_count{framework="MITRE",control="List Kubernetes secrets"} 74
# Number of resources excluded as part of MITRE control List Kubernetes secrets
kubescape_resources_excluded_count{framework="MITRE",control="List Kubernetes secrets"} 0
# Number of resources failed as part of MITRE control List Kubernetes secrets
kubescape_resources_failed_count{framework="MITRE",control="List Kubernetes secrets"} 15
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 2
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 2
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 2
# Number of resources found as part of MITRE control Mount service principal
kubescape_resources_found_count{framework="MITRE",control="Mount service principal"} 22
# Number of resources excluded as part of MITRE control Mount service principal
kubescape_resources_excluded_count{framework="MITRE",control="Mount service principal"} 0
# Number of resources failed as part of MITRE control Mount service principal
kubescape_resources_failed_count{framework="MITRE",control="Mount service principal"} 7
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Number of resources found as part of MITRE control Network mapping
kubescape_resources_found_count{framework="MITRE",control="Network mapping"} 7
# Number of resources excluded as part of MITRE control Network mapping
kubescape_resources_excluded_count{framework="MITRE",control="Network mapping"} 0
# Number of resources failed as part of MITRE control Network mapping
kubescape_resources_failed_count{framework="MITRE",control="Network mapping"} 7
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="armo-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="cyberarmor-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="default",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="kube-node-lease",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="kube-public",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="kube-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="nginx-ingress",groupVersionKind="v1/Namespace"} 1
# Number of resources found as part of MITRE control Privileged container
kubescape_resources_found_count{framework="MITRE",control="Privileged container"} 22
# Number of resources excluded as part of MITRE control Privileged container
kubescape_resources_excluded_count{framework="MITRE",control="Privileged container"} 0
# Number of resources failed as part of MITRE control Privileged container
kubescape_resources_failed_count{framework="MITRE",control="Privileged container"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of MITRE control Writable hostPath mount
kubescape_resources_found_count{framework="MITRE",control="Writable hostPath mount"} 22
# Number of resources excluded as part of MITRE control Writable hostPath mount
kubescape_resources_excluded_count{framework="MITRE",control="Writable hostPath mount"} 0
# Number of resources failed as part of MITRE control Writable hostPath mount
kubescape_resources_failed_count{framework="MITRE",control="Writable hostPath mount"} 7
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of MITRE control Malicious admission controller (mutating)
kubescape_resources_found_count{framework="MITRE",control="Malicious admission controller (mutating)"} 1
# Number of resources excluded as part of MITRE control Malicious admission controller (mutating)
kubescape_resources_excluded_count{framework="MITRE",control="Malicious admission controller (mutating)"} 0
# Number of resources failed as part of MITRE control Malicious admission controller (mutating)
kubescape_resources_failed_count{framework="MITRE",control="Malicious admission controller (mutating)"} 1
# Failed object from "MITRE" control "Malicious admission controller (mutating)"
kubescape_object_failed_count{framework="MITRE",control="Malicious admission controller (mutating)",name="ca-mutate-cfg",groupVersionKind="admissionregistration.k8s.io/v1/MutatingWebhookConfiguration"} 1
# Number of resources found as part of MITRE control Malicious admission controller (validating)
kubescape_resources_found_count{framework="MITRE",control="Malicious admission controller (validating)"} 1
# Number of resources excluded as part of MITRE control Malicious admission controller (validating)
kubescape_resources_excluded_count{framework="MITRE",control="Malicious admission controller (validating)"} 0
# Number of resources failed as part of MITRE control Malicious admission controller (validating)
kubescape_resources_failed_count{framework="MITRE",control="Malicious admission controller (validating)"} 1
# Failed object from "MITRE" control "Malicious admission controller (validating)"
kubescape_object_failed_count{framework="MITRE",control="Malicious admission controller (validating)",name="ca-validate-cfg",groupVersionKind="admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration"} 1
# Number of resources found as part of MITRE control Delete Kubernetes events
kubescape_resources_found_count{framework="MITRE",control="Delete Kubernetes events"} 74
# Number of resources excluded as part of MITRE control Delete Kubernetes events
kubescape_resources_excluded_count{framework="MITRE",control="Delete Kubernetes events"} 0
# Number of resources failed as part of MITRE control Delete Kubernetes events
kubescape_resources_failed_count{framework="MITRE",control="Delete Kubernetes events"} 6
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Number of resources found as part of MITRE control CoreDNS poisoning
kubescape_resources_found_count{framework="MITRE",control="CoreDNS poisoning"} 74
# Number of resources excluded as part of MITRE control CoreDNS poisoning
kubescape_resources_excluded_count{framework="MITRE",control="CoreDNS poisoning"} 0
# Number of resources failed as part of MITRE control CoreDNS poisoning
kubescape_resources_failed_count{framework="MITRE",control="CoreDNS poisoning"} 6
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Number of resources found as part of MITRE control Data Destruction
kubescape_resources_found_count{framework="MITRE",control="Data Destruction"} 74
# Number of resources excluded as part of MITRE control Data Destruction
kubescape_resources_excluded_count{framework="MITRE",control="Data Destruction"} 0
# Number of resources failed as part of MITRE control Data Destruction
kubescape_resources_failed_count{framework="MITRE",control="Data Destruction"} 20
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 2
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Number of resources found as part of MITRE control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_found_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 36
# Number of resources excluded as part of MITRE control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_excluded_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 0
# Number of resources failed as part of MITRE control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-nginx-ingress-deployment-nginx-ingress",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-posture-score-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="default",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="default",name="kubescape",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-node-lease",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-public",name="cluster-info",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-public",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="coredns",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="extension-apiserver-authentication",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kubeadm-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kubelet-config-1.22",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="ingress-controller-leader-nginx",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-scan-scheduler-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-kubescape-config",groupVersionKind="v1/ConfigMap"} 1
# Number of resources found as part of ArmoBest control Immutable container filesystem
kubescape_resources_found_count{framework="ArmoBest",control="Immutable container filesystem"} 22
# Number of resources excluded as part of ArmoBest control Immutable container filesystem
kubescape_resources_excluded_count{framework="ArmoBest",control="Immutable container filesystem"} 0
# Number of resources failed as part of ArmoBest control Immutable container filesystem
kubescape_resources_failed_count{framework="ArmoBest",control="Immutable container filesystem"} 21
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of ArmoBest control Privileged container
kubescape_resources_found_count{framework="ArmoBest",control="Privileged container"} 22
# Number of resources excluded as part of ArmoBest control Privileged container
kubescape_resources_excluded_count{framework="ArmoBest",control="Privileged container"} 0
# Number of resources failed as part of ArmoBest control Privileged container
kubescape_resources_failed_count{framework="ArmoBest",control="Privileged container"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of ArmoBest control Allowed hostPath
kubescape_resources_found_count{framework="ArmoBest",control="Allowed hostPath"} 22
# Number of resources excluded as part of ArmoBest control Allowed hostPath
kubescape_resources_excluded_count{framework="ArmoBest",control="Allowed hostPath"} 0
# Number of resources failed as part of ArmoBest control Allowed hostPath
kubescape_resources_failed_count{framework="ArmoBest",control="Allowed hostPath"} 7
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Number of resources found as part of ArmoBest control Automatic mapping of service account
kubescape_resources_found_count{framework="ArmoBest",control="Automatic mapping of service account"} 47
# Number of resources excluded as part of ArmoBest control Automatic mapping of service account
kubescape_resources_excluded_count{framework="ArmoBest",control="Automatic mapping of service account"} 0
# Number of resources failed as part of ArmoBest control Automatic mapping of service account
kubescape_resources_failed_count{framework="ArmoBest",control="Automatic mapping of service account"} 47
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="nginx-ingress",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="armo-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="cyberarmor-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="default",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-node-lease",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-public",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="attachdetach-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="certificate-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="expand-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="bootstrap-signer",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="disruption-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="endpoint-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="endpointslice-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="replication-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="token-cleaner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="resourcequota-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="service-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="ttl-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="namespace-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="cronjob-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="job-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="replicaset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="statefulset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="daemon-set-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="deployment-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="pv-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="service-account-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="coredns",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="node-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="v1/ServiceAccount"} 1
# Number of resources found as part of ArmoBest control hostNetwork access
kubescape_resources_found_count{framework="ArmoBest",control="hostNetwork access"} 22
# Number of resources excluded as part of ArmoBest control hostNetwork access
kubescape_resources_excluded_count{framework="ArmoBest",control="hostNetwork access"} 0
# Number of resources failed as part of ArmoBest control hostNetwork access
kubescape_resources_failed_count{framework="ArmoBest",control="hostNetwork access"} 6
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of ArmoBest control Resource policies
kubescape_resources_found_count{framework="ArmoBest",control="Resource policies"} 22
# Number of resources excluded as part of ArmoBest control Resource policies
kubescape_resources_excluded_count{framework="ArmoBest",control="Resource policies"} 0
# Number of resources failed as part of ArmoBest control Resource policies
kubescape_resources_failed_count{framework="ArmoBest",control="Resource policies"} 9
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of ArmoBest control Allow privilege escalation
kubescape_resources_found_count{framework="ArmoBest",control="Allow privilege escalation"} 22
# Number of resources excluded as part of ArmoBest control Allow privilege escalation
kubescape_resources_excluded_count{framework="ArmoBest",control="Allow privilege escalation"} 0
# Number of resources failed as part of ArmoBest control Allow privilege escalation
kubescape_resources_failed_count{framework="ArmoBest",control="Allow privilege escalation"} 21
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of ArmoBest control Applications credentials in configuration files
kubescape_resources_found_count{framework="ArmoBest",control="Applications credentials in configuration files"} 44
# Number of resources excluded as part of ArmoBest control Applications credentials in configuration files
kubescape_resources_excluded_count{framework="ArmoBest",control="Applications credentials in configuration files"} 0
# Number of resources failed as part of ArmoBest control Applications credentials in configuration files
kubescape_resources_failed_count{framework="ArmoBest",control="Applications credentials in configuration files"} 8
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="armo-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="default",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-node-lease",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-public",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="nginx-ingress",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="extension-apiserver-authentication",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-public",name="cluster-info",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="coredns",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="kubeadm-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="kubelet-config-1.22",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="nginx-ingress",name="ingress-controller-leader-nginx",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="armo-system",name="armo-scan-scheduler-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="armo-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="armo-system",name="armo-kubescape-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-nginx-ingress-deployment-nginx-ingress",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-posture-score-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="default",name="kubescape",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Number of resources found as part of ArmoBest control Cluster-admin binding
kubescape_resources_found_count{framework="ArmoBest",control="Cluster-admin binding"} 74
# Number of resources excluded as part of ArmoBest control Cluster-admin binding
kubescape_resources_excluded_count{framework="ArmoBest",control="Cluster-admin binding"} 0
# Number of resources failed as part of ArmoBest control Cluster-admin binding
kubescape_resources_failed_count{framework="ArmoBest",control="Cluster-admin binding"} 4
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Number of resources found as part of ArmoBest control Exec into container
kubescape_resources_found_count{framework="ArmoBest",control="Exec into container"} 74
# Number of resources excluded as part of ArmoBest control Exec into container
kubescape_resources_excluded_count{framework="ArmoBest",control="Exec into container"} 0
# Number of resources failed as part of ArmoBest control Exec into container
kubescape_resources_failed_count{framework="ArmoBest",control="Exec into container"} 4
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Number of resources found as part of ArmoBest control Insecure capabilities
kubescape_resources_found_count{framework="ArmoBest",control="Insecure capabilities"} 22
# Number of resources excluded as part of ArmoBest control Insecure capabilities
kubescape_resources_excluded_count{framework="ArmoBest",control="Insecure capabilities"} 0
# Number of resources failed as part of ArmoBest control Insecure capabilities
kubescape_resources_failed_count{framework="ArmoBest",control="Insecure capabilities"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of ArmoBest control Linux hardening
kubescape_resources_found_count{framework="ArmoBest",control="Linux hardening"} 22
# Number of resources excluded as part of ArmoBest control Linux hardening
kubescape_resources_excluded_count{framework="ArmoBest",control="Linux hardening"} 0
# Number of resources failed as part of ArmoBest control Linux hardening
kubescape_resources_failed_count{framework="ArmoBest",control="Linux hardening"} 17
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of ArmoBest control Ingress and Egress blocked
kubescape_resources_found_count{framework="ArmoBest",control="Ingress and Egress blocked"} 22
# Number of resources excluded as part of ArmoBest control Ingress and Egress blocked
kubescape_resources_excluded_count{framework="ArmoBest",control="Ingress and Egress blocked"} 0
# Number of resources failed as part of ArmoBest control Ingress and Egress blocked
kubescape_resources_failed_count{framework="ArmoBest",control="Ingress and Egress blocked"} 22
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of ArmoBest control Network policies
kubescape_resources_found_count{framework="ArmoBest",control="Network policies"} 7
# Number of resources excluded as part of ArmoBest control Network policies
kubescape_resources_excluded_count{framework="ArmoBest",control="Network policies"} 0
# Number of resources failed as part of ArmoBest control Network policies
kubescape_resources_failed_count{framework="ArmoBest",control="Network policies"} 7
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="armo-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="cyberarmor-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="default",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="kube-node-lease",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="kube-public",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="kube-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="nginx-ingress",groupVersionKind="v1/Namespace"} 1
# Number of resources found as part of ArmoBest control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_found_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 36
# Number of resources excluded as part of ArmoBest control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_excluded_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 0
# Number of resources failed as part of ArmoBest control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="ingress-controller-leader-nginx",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-kubescape-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-scan-scheduler-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-nginx-ingress-deployment-nginx-ingress",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-posture-score-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="default",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="default",name="kubescape",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-node-lease",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-public",name="cluster-info",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-public",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kubeadm-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kubelet-config-1.22",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="coredns",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="extension-apiserver-authentication",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of ArmoBest control No impersonation
kubescape_resources_found_count{framework="ArmoBest",control="No impersonation"} 74
# Number of resources excluded as part of ArmoBest control No impersonation
kubescape_resources_excluded_count{framework="ArmoBest",control="No impersonation"} 0
# Number of resources failed as part of ArmoBest control No impersonation
kubescape_resources_failed_count{framework="ArmoBest",control="No impersonation"} 4
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Number of resources found as part of ArmoBest control Portforwarding privileges
kubescape_resources_found_count{framework="ArmoBest",control="Portforwarding privileges"} 74
# Number of resources excluded as part of ArmoBest control Portforwarding privileges
kubescape_resources_excluded_count{framework="ArmoBest",control="Portforwarding privileges"} 0
# Number of resources failed as part of ArmoBest control Portforwarding privileges
kubescape_resources_failed_count{framework="ArmoBest",control="Portforwarding privileges"} 8
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:authenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:monitoring",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:unauthenticated",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:serviceaccounts",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:bootstrappers:kubeadm:default-node-token",groupVersionKind="rbac.authorization.k8s.io/Group"} 6
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:nodes",groupVersionKind="rbac.authorization.k8s.io/Group"} 3
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="ttl-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="cloud-provider",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="endpointslice-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="certificate-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="endpoint-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="coredns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="route-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="storage-provisioner",groupVersionKind="/ServiceAccount"} 2
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="disruption-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="service-account-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="service-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="kube-dns",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="kube-controller-manager",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="kube-proxy",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 4
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="kube-scheduler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="attachdetach-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="pv-protection-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 4
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:kube-proxy",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:anonymous",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 3
# Number of resources found as part of ArmoBest control Image pull policy on latest image tag
kubescape_resources_found_count{framework="ArmoBest",control="Image pull policy on latest image tag"} 22
# Number of resources excluded as part of ArmoBest control Image pull policy on latest image tag
kubescape_resources_excluded_count{framework="ArmoBest",control="Image pull policy on latest image tag"} 0
# Number of resources failed as part of ArmoBest control Image pull policy on latest image tag
kubescape_resources_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag"} 2
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Number of resources found as part of ArmoBest control Namespace without service accounts
kubescape_resources_found_count{framework="ArmoBest",control="Namespace without service accounts"} 54
# Number of resources excluded as part of ArmoBest control Namespace without service accounts
kubescape_resources_excluded_count{framework="ArmoBest",control="Namespace without service accounts"} 0
# Number of resources failed as part of ArmoBest control Namespace without service accounts
kubescape_resources_failed_count{framework="ArmoBest",control="Namespace without service accounts"} 3
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",name="kube-public",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",name="default",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",name="kube-node-lease",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",name="armo-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",name="cyberarmor-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",name="kube-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",name="nginx-ingress",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="cyberarmor-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="default",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-node-lease",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-public",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="deployment-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="endpoint-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="replication-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="coredns",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="daemon-set-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="namespace-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="resourcequota-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="expand-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="ttl-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="certificate-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="node-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="disruption-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="endpointslice-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="token-cleaner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="bootstrap-signer",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="cronjob-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="service-account-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="attachdetach-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="job-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="pv-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="replicaset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="service-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="statefulset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="nginx-ingress",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",namespace="armo-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Number of resources found as part of cve-scanning control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_found_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 36
# Number of resources excluded as part of cve-scanning control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_excluded_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 0
# Number of resources failed as part of cve-scanning control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-public",name="cluster-info",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-public",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="extension-apiserver-authentication",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kubeadm-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="kubelet-config-1.22",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="coredns",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="ingress-controller-leader-nginx",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-kubescape-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-scan-scheduler-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-nginx-ingress-deployment-nginx-ingress",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-posture-score-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="armo-be-config",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="default",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="default",name="kubescape",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-node-lease",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
