# Number of resources found as part of NSA control Immutable container filesystem
kubescape_resources_found_count{framework="NSA",control="Immutable container filesystem"} 22
# Number of resources excluded as part of NSA control Immutable container filesystem
kubescape_resources_excluded_count{framework="NSA",control="Immutable container filesystem"} 0
# Number of resources failed as part of NSA control Immutable container filesystem
kubescape_resources_failed_count{framework="NSA",control="Immutable container filesystem"} 21
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Immutable container filesystem"
kubescape_object_failed_count{framework="NSA",control="Immutable container filesystem",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of NSA control Privileged container
kubescape_resources_found_count{framework="NSA",control="Privileged container"} 22
# Number of resources excluded as part of NSA control Privileged container
kubescape_resources_excluded_count{framework="NSA",control="Privileged container"} 0
# Number of resources failed as part of NSA control Privileged container
kubescape_resources_failed_count{framework="NSA",control="Privileged container"} 1
# Failed object from "NSA" control "Privileged container"
kubescape_object_failed_count{framework="NSA",control="Privileged container",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Number of resources found as part of NSA control Allowed hostPath
kubescape_resources_found_count{framework="NSA",control="Allowed hostPath"} 22
# Number of resources excluded as part of NSA control Allowed hostPath
kubescape_resources_excluded_count{framework="NSA",control="Allowed hostPath"} 0
# Number of resources failed as part of NSA control Allowed hostPath
kubescape_resources_failed_count{framework="NSA",control="Allowed hostPath"} 7
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allowed hostPath"
kubescape_object_failed_count{framework="NSA",control="Allowed hostPath",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Number of resources found as part of NSA control Automatic mapping of service account
kubescape_resources_found_count{framework="NSA",control="Automatic mapping of service account"} 47
# Number of resources excluded as part of NSA control Automatic mapping of service account
kubescape_resources_excluded_count{framework="NSA",control="Automatic mapping of service account"} 0
# Number of resources failed as part of NSA control Automatic mapping of service account
kubescape_resources_failed_count{framework="NSA",control="Automatic mapping of service account"} 47
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="expand-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="token-cleaner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="coredns",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="certificate-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="daemon-set-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="endpoint-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="service-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="attachdetach-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="pv-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="statefulset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="cronjob-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="node-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="replication-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="ttl-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="bootstrap-signer",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="deployment-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="job-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="namespace-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="replicaset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="resourcequota-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="disruption-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="endpointslice-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="service-account-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="nginx-ingress",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="armo-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="cyberarmor-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="default",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-node-lease",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "NSA" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="NSA",control="Automatic mapping of service account",namespace="kube-public",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Number of resources found as part of NSA control hostNetwork access
kubescape_resources_found_count{framework="NSA",control="hostNetwork access"} 22
# Number of resources excluded as part of NSA control hostNetwork access
kubescape_resources_excluded_count{framework="NSA",control="hostNetwork access"} 0
# Number of resources failed as part of NSA control hostNetwork access
kubescape_resources_failed_count{framework="NSA",control="hostNetwork access"} 6
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "hostNetwork access"
kubescape_object_failed_count{framework="NSA",control="hostNetwork access",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Number of resources found as part of NSA control Resource policies
kubescape_resources_found_count{framework="NSA",control="Resource policies"} 22
# Number of resources excluded as part of NSA control Resource policies
kubescape_resources_excluded_count{framework="NSA",control="Resource policies"} 0
# Number of resources failed as part of NSA control Resource policies
kubescape_resources_failed_count{framework="NSA",control="Resource policies"} 9
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Resource policies"
kubescape_object_failed_count{framework="NSA",control="Resource policies",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Number of resources found as part of NSA control Allow privilege escalation
kubescape_resources_found_count{framework="NSA",control="Allow privilege escalation"} 22
# Number of resources excluded as part of NSA control Allow privilege escalation
kubescape_resources_excluded_count{framework="NSA",control="Allow privilege escalation"} 0
# Number of resources failed as part of NSA control Allow privilege escalation
kubescape_resources_failed_count{framework="NSA",control="Allow privilege escalation"} 21
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Allow privilege escalation"
kubescape_object_failed_count{framework="NSA",control="Allow privilege escalation",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of NSA control Applications credentials in configuration files
kubescape_resources_found_count{framework="NSA",control="Applications credentials in configuration files"} 44
# Number of resources excluded as part of NSA control Applications credentials in configuration files
kubescape_resources_excluded_count{framework="NSA",control="Applications credentials in configuration files"} 0
# Number of resources failed as part of NSA control Applications credentials in configuration files
kubescape_resources_failed_count{framework="NSA",control="Applications credentials in configuration files"} 8
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="armo-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="default",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-node-lease",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-public",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="nginx-ingress",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="extension-apiserver-authentication",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "NSA" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="NSA",control="Applications credentials in configuration files",namespace="kube-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Number of resources found as part of NSA control Cluster-admin binding
kubescape_resources_found_count{framework="NSA",control="Cluster-admin binding"} 74
# Number of resources excluded as part of NSA control Cluster-admin binding
kubescape_resources_excluded_count{framework="NSA",control="Cluster-admin binding"} 0
# Number of resources failed as part of NSA control Cluster-admin binding
kubescape_resources_failed_count{framework="NSA",control="Cluster-admin binding"} 4
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Cluster-admin binding"
kubescape_object_failed_count{framework="NSA",control="Cluster-admin binding",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Number of resources found as part of NSA control Exec into container
kubescape_resources_found_count{framework="NSA",control="Exec into container"} 74
# Number of resources excluded as part of NSA control Exec into container
kubescape_resources_excluded_count{framework="NSA",control="Exec into container"} 0
# Number of resources failed as part of NSA control Exec into container
kubescape_resources_failed_count{framework="NSA",control="Exec into container"} 4
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "NSA" control "Exec into container"
kubescape_object_failed_count{framework="NSA",control="Exec into container",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Number of resources found as part of NSA control Insecure capabilities
kubescape_resources_found_count{framework="NSA",control="Insecure capabilities"} 22
# Number of resources excluded as part of NSA control Insecure capabilities
kubescape_resources_excluded_count{framework="NSA",control="Insecure capabilities"} 0
# Number of resources failed as part of NSA control Insecure capabilities
kubescape_resources_failed_count{framework="NSA",control="Insecure capabilities"} 1
# Failed object from "NSA" control "Insecure capabilities"
kubescape_object_failed_count{framework="NSA",control="Insecure capabilities",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of NSA control Linux hardening
kubescape_resources_found_count{framework="NSA",control="Linux hardening"} 22
# Number of resources excluded as part of NSA control Linux hardening
kubescape_resources_excluded_count{framework="NSA",control="Linux hardening"} 0
# Number of resources failed as part of NSA control Linux hardening
kubescape_resources_failed_count{framework="NSA",control="Linux hardening"} 17
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Linux hardening"
kubescape_object_failed_count{framework="NSA",control="Linux hardening",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of NSA control Ingress and Egress blocked
kubescape_resources_found_count{framework="NSA",control="Ingress and Egress blocked"} 22
# Number of resources excluded as part of NSA control Ingress and Egress blocked
kubescape_resources_excluded_count{framework="NSA",control="Ingress and Egress blocked"} 0
# Number of resources failed as part of NSA control Ingress and Egress blocked
kubescape_resources_failed_count{framework="NSA",control="Ingress and Egress blocked"} 22
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "NSA" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="NSA",control="Ingress and Egress blocked",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of NSA control Network policies
kubescape_resources_found_count{framework="NSA",control="Network policies"} 7
# Number of resources excluded as part of NSA control Network policies
kubescape_resources_excluded_count{framework="NSA",control="Network policies"} 0
# Number of resources failed as part of NSA control Network policies
kubescape_resources_failed_count{framework="NSA",control="Network policies"} 7
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="default",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="kube-node-lease",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="kube-public",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="kube-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="nginx-ingress",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="armo-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "NSA" control "Network policies"
kubescape_object_failed_count{framework="NSA",control="Network policies",name="cyberarmor-system",groupVersionKind="v1/Namespace"} 1
# Number of resources found as part of NSA control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_found_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 36
# Number of resources excluded as part of NSA control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_excluded_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 0
# Number of resources failed as part of NSA control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 1
# Failed object from "NSA" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="NSA",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of MITRE control Access container service account
kubescape_resources_found_count{framework="MITRE",control="Access container service account"} 216
# Number of resources excluded as part of MITRE control Access container service account
kubescape_resources_excluded_count{framework="MITRE",control="Access container service account"} 0
# Number of resources failed as part of MITRE control Access container service account
kubescape_resources_failed_count{framework="MITRE",control="Access container service account"} 31
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system:persistent-volume-provisioner",groupVersionKind="rbac.authorization.k8s.io/v1/RoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="system:persistent-volume-provisioner",groupVersionKind="rbac.authorization.k8s.io/v1/Role"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:node-proxier",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="nginx-ingress-roles",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="armo-kubescape-service-account-roles",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:persistent-volume-provisioner",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="armo-scanner-service-account-roles",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="ca-controller-roles",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:coredns",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRole"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="storage-provisioner",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="armo-scanner-service-account-role-binding",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="ca-controller-role-binding",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="system:coredns",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="kubeadm:node-proxier",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="nginx-ingress-roles-binding",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",name="armo-kubescape-service-account-role-binding",groupVersionKind="rbac.authorization.k8s.io/v1/ClusterRoleBinding"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Access container service account"
kubescape_object_failed_count{framework="MITRE",control="Access container service account",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of MITRE control Applications credentials in configuration files
kubescape_resources_found_count{framework="MITRE",control="Applications credentials in configuration files"} 44
# Number of resources excluded as part of MITRE control Applications credentials in configuration files
kubescape_resources_excluded_count{framework="MITRE",control="Applications credentials in configuration files"} 0
# Number of resources failed as part of MITRE control Applications credentials in configuration files
kubescape_resources_failed_count{framework="MITRE",control="Applications credentials in configuration files"} 8
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="nginx-ingress",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="extension-apiserver-authentication",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="armo-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="default",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-node-lease",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "MITRE" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="MITRE",control="Applications credentials in configuration files",namespace="kube-public",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Number of resources found as part of MITRE control Cluster-admin binding
kubescape_resources_found_count{framework="MITRE",control="Cluster-admin binding"} 74
# Number of resources excluded as part of MITRE control Cluster-admin binding
kubescape_resources_excluded_count{framework="MITRE",control="Cluster-admin binding"} 0
# Number of resources failed as part of MITRE control Cluster-admin binding
kubescape_resources_failed_count{framework="MITRE",control="Cluster-admin binding"} 4
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Cluster-admin binding"
kubescape_object_failed_count{framework="MITRE",control="Cluster-admin binding",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Number of resources found as part of MITRE control Cluster internal networking
kubescape_resources_found_count{framework="MITRE",control="Cluster internal networking"} 7
# Number of resources excluded as part of MITRE control Cluster internal networking
kubescape_resources_excluded_count{framework="MITRE",control="Cluster internal networking"} 0
# Number of resources failed as part of MITRE control Cluster internal networking
kubescape_resources_failed_count{framework="MITRE",control="Cluster internal networking"} 7
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="armo-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="cyberarmor-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="default",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="kube-node-lease",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="kube-public",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="kube-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Cluster internal networking"
kubescape_object_failed_count{framework="MITRE",control="Cluster internal networking",name="nginx-ingress",groupVersionKind="v1/Namespace"} 1
# Number of resources found as part of MITRE control Exec into container
kubescape_resources_found_count{framework="MITRE",control="Exec into container"} 74
# Number of resources excluded as part of MITRE control Exec into container
kubescape_resources_excluded_count{framework="MITRE",control="Exec into container"} 0
# Number of resources failed as part of MITRE control Exec into container
kubescape_resources_failed_count{framework="MITRE",control="Exec into container"} 4
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Exec into container"
kubescape_object_failed_count{framework="MITRE",control="Exec into container",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Number of resources found as part of MITRE control hostPath mount
kubescape_resources_found_count{framework="MITRE",control="hostPath mount"} 22
# Number of resources excluded as part of MITRE control hostPath mount
kubescape_resources_excluded_count{framework="MITRE",control="hostPath mount"} 0
# Number of resources failed as part of MITRE control hostPath mount
kubescape_resources_failed_count{framework="MITRE",control="hostPath mount"} 7
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="hostPath mount",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of MITRE control Kubernetes CronJob
kubescape_resources_found_count{framework="MITRE",control="Kubernetes CronJob"} 2
# Number of resources excluded as part of MITRE control Kubernetes CronJob
kubescape_resources_excluded_count{framework="MITRE",control="Kubernetes CronJob"} 0
# Number of resources failed as part of MITRE control Kubernetes CronJob
kubescape_resources_failed_count{framework="MITRE",control="Kubernetes CronJob"} 2
# Failed object from "MITRE" control "Kubernetes CronJob"
kubescape_object_failed_count{framework="MITRE",control="Kubernetes CronJob",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "MITRE" control "Kubernetes CronJob"
kubescape_object_failed_count{framework="MITRE",control="Kubernetes CronJob",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of MITRE control List Kubernetes secrets
kubescape_resources_found_count{framework="MITRE",control="List Kubernetes secrets"} 74
# Number of resources excluded as part of MITRE control List Kubernetes secrets
kubescape_resources_excluded_count{framework="MITRE",control="List Kubernetes secrets"} 0
# Number of resources failed as part of MITRE control List Kubernetes secrets
kubescape_resources_failed_count{framework="MITRE",control="List Kubernetes secrets"} 15
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="resourcequota-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="bootstrap-signer",groupVersionKind="/ServiceAccount"} 2
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="expand-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "List Kubernetes secrets"
kubescape_object_failed_count{framework="MITRE",control="List Kubernetes secrets",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Number of resources found as part of MITRE control Mount service principal
kubescape_resources_found_count{framework="MITRE",control="Mount service principal"} 22
# Number of resources excluded as part of MITRE control Mount service principal
kubescape_resources_excluded_count{framework="MITRE",control="Mount service principal"} 0
# Number of resources failed as part of MITRE control Mount service principal
kubescape_resources_failed_count{framework="MITRE",control="Mount service principal"} 7
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Mount service principal"
kubescape_object_failed_count{framework="MITRE",control="Mount service principal",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of MITRE control Network mapping
kubescape_resources_found_count{framework="MITRE",control="Network mapping"} 7
# Number of resources excluded as part of MITRE control Network mapping
kubescape_resources_excluded_count{framework="MITRE",control="Network mapping"} 0
# Number of resources failed as part of MITRE control Network mapping
kubescape_resources_failed_count{framework="MITRE",control="Network mapping"} 7
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="armo-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="cyberarmor-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="default",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="kube-node-lease",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="kube-public",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="kube-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "MITRE" control "Network mapping"
kubescape_object_failed_count{framework="MITRE",control="Network mapping",name="nginx-ingress",groupVersionKind="v1/Namespace"} 1
# Number of resources found as part of MITRE control Privileged container
kubescape_resources_found_count{framework="MITRE",control="Privileged container"} 22
# Number of resources excluded as part of MITRE control Privileged container
kubescape_resources_excluded_count{framework="MITRE",control="Privileged container"} 0
# Number of resources failed as part of MITRE control Privileged container
kubescape_resources_failed_count{framework="MITRE",control="Privileged container"} 1
# Failed object from "MITRE" control "Privileged container"
kubescape_object_failed_count{framework="MITRE",control="Privileged container",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Number of resources found as part of MITRE control Writable hostPath mount
kubescape_resources_found_count{framework="MITRE",control="Writable hostPath mount"} 22
# Number of resources excluded as part of MITRE control Writable hostPath mount
kubescape_resources_excluded_count{framework="MITRE",control="Writable hostPath mount"} 0
# Number of resources failed as part of MITRE control Writable hostPath mount
kubescape_resources_failed_count{framework="MITRE",control="Writable hostPath mount"} 7
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "MITRE" control "Writable hostPath mount"
kubescape_object_failed_count{framework="MITRE",control="Writable hostPath mount",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of MITRE control Malicious admission controller (mutating)
kubescape_resources_found_count{framework="MITRE",control="Malicious admission controller (mutating)"} 1
# Number of resources excluded as part of MITRE control Malicious admission controller (mutating)
kubescape_resources_excluded_count{framework="MITRE",control="Malicious admission controller (mutating)"} 0
# Number of resources failed as part of MITRE control Malicious admission controller (mutating)
kubescape_resources_failed_count{framework="MITRE",control="Malicious admission controller (mutating)"} 1
# Failed object from "MITRE" control "Malicious admission controller (mutating)"
kubescape_object_failed_count{framework="MITRE",control="Malicious admission controller (mutating)",name="ca-mutate-cfg",groupVersionKind="admissionregistration.k8s.io/v1/MutatingWebhookConfiguration"} 1
# Number of resources found as part of MITRE control Malicious admission controller (validating)
kubescape_resources_found_count{framework="MITRE",control="Malicious admission controller (validating)"} 1
# Number of resources excluded as part of MITRE control Malicious admission controller (validating)
kubescape_resources_excluded_count{framework="MITRE",control="Malicious admission controller (validating)"} 0
# Number of resources failed as part of MITRE control Malicious admission controller (validating)
kubescape_resources_failed_count{framework="MITRE",control="Malicious admission controller (validating)"} 1
# Failed object from "MITRE" control "Malicious admission controller (validating)"
kubescape_object_failed_count{framework="MITRE",control="Malicious admission controller (validating)",name="ca-validate-cfg",groupVersionKind="admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration"} 1
# Number of resources found as part of MITRE control Delete Kubernetes events
kubescape_resources_found_count{framework="MITRE",control="Delete Kubernetes events"} 74
# Number of resources excluded as part of MITRE control Delete Kubernetes events
kubescape_resources_excluded_count{framework="MITRE",control="Delete Kubernetes events"} 0
# Number of resources failed as part of MITRE control Delete Kubernetes events
kubescape_resources_failed_count{framework="MITRE",control="Delete Kubernetes events"} 6
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Delete Kubernetes events"
kubescape_object_failed_count{framework="MITRE",control="Delete Kubernetes events",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Number of resources found as part of MITRE control CoreDNS poisoning
kubescape_resources_found_count{framework="MITRE",control="CoreDNS poisoning"} 74
# Number of resources excluded as part of MITRE control CoreDNS poisoning
kubescape_resources_excluded_count{framework="MITRE",control="CoreDNS poisoning"} 0
# Number of resources failed as part of MITRE control CoreDNS poisoning
kubescape_resources_failed_count{framework="MITRE",control="CoreDNS poisoning"} 6
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "CoreDNS poisoning"
kubescape_object_failed_count{framework="MITRE",control="CoreDNS poisoning",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Number of resources found as part of MITRE control Data Destruction
kubescape_resources_found_count{framework="MITRE",control="Data Destruction"} 74
# Number of resources excluded as part of MITRE control Data Destruction
kubescape_resources_excluded_count{framework="MITRE",control="Data Destruction"} 0
# Number of resources failed as part of MITRE control Data Destruction
kubescape_resources_failed_count{framework="MITRE",control="Data Destruction"} 20
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="token-cleaner",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="cronjob-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="deployment-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="node-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="replicaset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="daemon-set-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="replication-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="job-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="kube-system",name="statefulset-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:kube-controller-manager",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Failed object from "MITRE" control "Data Destruction"
kubescape_object_failed_count{framework="MITRE",control="Data Destruction",name="system:kube-scheduler",groupVersionKind="rbac.authorization.k8s.io/User"} 1
# Number of resources found as part of MITRE control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_found_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 36
# Number of resources excluded as part of MITRE control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_excluded_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 0
# Number of resources failed as part of MITRE control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 1
# Failed object from "MITRE" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="MITRE",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of ArmoBest control Immutable container filesystem
kubescape_resources_found_count{framework="ArmoBest",control="Immutable container filesystem"} 22
# Number of resources excluded as part of ArmoBest control Immutable container filesystem
kubescape_resources_excluded_count{framework="ArmoBest",control="Immutable container filesystem"} 0
# Number of resources failed as part of ArmoBest control Immutable container filesystem
kubescape_resources_failed_count{framework="ArmoBest",control="Immutable container filesystem"} 21
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Immutable container filesystem"
kubescape_object_failed_count{framework="ArmoBest",control="Immutable container filesystem",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of ArmoBest control Privileged container
kubescape_resources_found_count{framework="ArmoBest",control="Privileged container"} 22
# Number of resources excluded as part of ArmoBest control Privileged container
kubescape_resources_excluded_count{framework="ArmoBest",control="Privileged container"} 0
# Number of resources failed as part of ArmoBest control Privileged container
kubescape_resources_failed_count{framework="ArmoBest",control="Privileged container"} 1
# Failed object from "ArmoBest" control "Privileged container"
kubescape_object_failed_count{framework="ArmoBest",control="Privileged container",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Number of resources found as part of ArmoBest control Allowed hostPath
kubescape_resources_found_count{framework="ArmoBest",control="Allowed hostPath"} 22
# Number of resources excluded as part of ArmoBest control Allowed hostPath
kubescape_resources_excluded_count{framework="ArmoBest",control="Allowed hostPath"} 0
# Number of resources failed as part of ArmoBest control Allowed hostPath
kubescape_resources_failed_count{framework="ArmoBest",control="Allowed hostPath"} 7
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allowed hostPath"
kubescape_object_failed_count{framework="ArmoBest",control="Allowed hostPath",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of ArmoBest control Automatic mapping of service account
kubescape_resources_found_count{framework="ArmoBest",control="Automatic mapping of service account"} 47
# Number of resources excluded as part of ArmoBest control Automatic mapping of service account
kubescape_resources_excluded_count{framework="ArmoBest",control="Automatic mapping of service account"} 0
# Number of resources failed as part of ArmoBest control Automatic mapping of service account
kubescape_resources_failed_count{framework="ArmoBest",control="Automatic mapping of service account"} 47
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-node-lease",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-public",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="ttl-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="resourcequota-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="endpointslice-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="pod-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="pvc-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="disruption-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="kube-proxy",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="node-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="pv-protection-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="service-account-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="attachdetach-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="endpointslicemirroring-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="expand-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="job-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="horizontal-pod-autoscaler",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="persistent-volume-binder",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="cronjob-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="endpoint-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="ephemeral-volume-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="namespace-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="ttl-after-finished-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="service-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="statefulset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="token-cleaner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="certificate-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="deployment-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="replicaset-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="root-ca-cert-publisher",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="replication-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="bootstrap-signer",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="clusterrole-aggregation-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="coredns",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="kube-system",name="daemon-set-controller",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="nginx-ingress",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="armo-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="cyberarmor-system",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="v1/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Automatic mapping of service account"
kubescape_object_failed_count{framework="ArmoBest",control="Automatic mapping of service account",namespace="default",name="default",groupVersionKind="v1/ServiceAccount"} 1
# Number of resources found as part of ArmoBest control hostNetwork access
kubescape_resources_found_count{framework="ArmoBest",control="hostNetwork access"} 22
# Number of resources excluded as part of ArmoBest control hostNetwork access
kubescape_resources_excluded_count{framework="ArmoBest",control="hostNetwork access"} 0
# Number of resources failed as part of ArmoBest control hostNetwork access
kubescape_resources_failed_count{framework="ArmoBest",control="hostNetwork access"} 6
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "hostNetwork access"
kubescape_object_failed_count{framework="ArmoBest",control="hostNetwork access",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Number of resources found as part of ArmoBest control Resource policies
kubescape_resources_found_count{framework="ArmoBest",control="Resource policies"} 22
# Number of resources excluded as part of ArmoBest control Resource policies
kubescape_resources_excluded_count{framework="ArmoBest",control="Resource policies"} 0
# Number of resources failed as part of ArmoBest control Resource policies
kubescape_resources_failed_count{framework="ArmoBest",control="Resource policies"} 9
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Resource policies"
kubescape_object_failed_count{framework="ArmoBest",control="Resource policies",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of ArmoBest control Allow privilege escalation
kubescape_resources_found_count{framework="ArmoBest",control="Allow privilege escalation"} 22
# Number of resources excluded as part of ArmoBest control Allow privilege escalation
kubescape_resources_excluded_count{framework="ArmoBest",control="Allow privilege escalation"} 0
# Number of resources failed as part of ArmoBest control Allow privilege escalation
kubescape_resources_failed_count{framework="ArmoBest",control="Allow privilege escalation"} 21
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Allow privilege escalation"
kubescape_object_failed_count{framework="ArmoBest",control="Allow privilege escalation",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of ArmoBest control Applications credentials in configuration files
kubescape_resources_found_count{framework="ArmoBest",control="Applications credentials in configuration files"} 44
# Number of resources excluded as part of ArmoBest control Applications credentials in configuration files
kubescape_resources_excluded_count{framework="ArmoBest",control="Applications credentials in configuration files"} 0
# Number of resources failed as part of ArmoBest control Applications credentials in configuration files
kubescape_resources_failed_count{framework="ArmoBest",control="Applications credentials in configuration files"} 8
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="armo-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="cyberarmor-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="default",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-node-lease",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-public",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="nginx-ingress",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="extension-apiserver-authentication",groupVersionKind="v1/ConfigMap"} 1
# Failed object from "ArmoBest" control "Applications credentials in configuration files"
kubescape_object_failed_count{framework="ArmoBest",control="Applications credentials in configuration files",namespace="kube-system",name="kube-root-ca.crt",groupVersionKind="v1/ConfigMap"} 1
# Number of resources found as part of ArmoBest control Cluster-admin binding
kubescape_resources_found_count{framework="ArmoBest",control="Cluster-admin binding"} 74
# Number of resources excluded as part of ArmoBest control Cluster-admin binding
kubescape_resources_excluded_count{framework="ArmoBest",control="Cluster-admin binding"} 0
# Number of resources failed as part of ArmoBest control Cluster-admin binding
kubescape_resources_failed_count{framework="ArmoBest",control="Cluster-admin binding"} 4
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Cluster-admin binding"
kubescape_object_failed_count{framework="ArmoBest",control="Cluster-admin binding",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Number of resources found as part of ArmoBest control Exec into container
kubescape_resources_found_count{framework="ArmoBest",control="Exec into container"} 74
# Number of resources excluded as part of ArmoBest control Exec into container
kubescape_resources_excluded_count{framework="ArmoBest",control="Exec into container"} 0
# Number of resources failed as part of ArmoBest control Exec into container
kubescape_resources_failed_count{framework="ArmoBest",control="Exec into container"} 4
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Exec into container"
kubescape_object_failed_count{framework="ArmoBest",control="Exec into container",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Number of resources found as part of ArmoBest control Insecure capabilities
kubescape_resources_found_count{framework="ArmoBest",control="Insecure capabilities"} 22
# Number of resources excluded as part of ArmoBest control Insecure capabilities
kubescape_resources_excluded_count{framework="ArmoBest",control="Insecure capabilities"} 0
# Number of resources failed as part of ArmoBest control Insecure capabilities
kubescape_resources_failed_count{framework="ArmoBest",control="Insecure capabilities"} 1
# Failed object from "ArmoBest" control "Insecure capabilities"
kubescape_object_failed_count{framework="ArmoBest",control="Insecure capabilities",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of ArmoBest control Linux hardening
kubescape_resources_found_count{framework="ArmoBest",control="Linux hardening"} 22
# Number of resources excluded as part of ArmoBest control Linux hardening
kubescape_resources_excluded_count{framework="ArmoBest",control="Linux hardening"} 0
# Number of resources failed as part of ArmoBest control Linux hardening
kubescape_resources_failed_count{framework="ArmoBest",control="Linux hardening"} 17
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Linux hardening"
kubescape_object_failed_count{framework="ArmoBest",control="Linux hardening",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of ArmoBest control Ingress and Egress blocked
kubescape_resources_found_count{framework="ArmoBest",control="Ingress and Egress blocked"} 22
# Number of resources excluded as part of ArmoBest control Ingress and Egress blocked
kubescape_resources_excluded_count{framework="ArmoBest",control="Ingress and Egress blocked"} 0
# Number of resources failed as part of ArmoBest control Ingress and Egress blocked
kubescape_resources_failed_count{framework="ArmoBest",control="Ingress and Egress blocked"} 22
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="armo-system",name="armo-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="armo-system",name="armo-web-socket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-notification-server",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-ocimage",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-websocket",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-audit",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-dashboard-aggregator",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-oracle",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-posture",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-rbac",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-vuln-scan",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="cyberarmor-system",name="ca-webhook",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="coredns",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="kube-proxy",groupVersionKind="apps/v1/DaemonSet"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="kube-scheduler-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="storage-provisioner",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="etcd-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="kube-apiserver-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Failed object from "ArmoBest" control "Ingress and Egress blocked"
kubescape_object_failed_count{framework="ArmoBest",control="Ingress and Egress blocked",namespace="kube-system",name="kube-controller-manager-david-virtualbox",groupVersionKind="v1/Pod"} 1
# Number of resources found as part of ArmoBest control Network policies
kubescape_resources_found_count{framework="ArmoBest",control="Network policies"} 7
# Number of resources excluded as part of ArmoBest control Network policies
kubescape_resources_excluded_count{framework="ArmoBest",control="Network policies"} 0
# Number of resources failed as part of ArmoBest control Network policies
kubescape_resources_failed_count{framework="ArmoBest",control="Network policies"} 7
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="armo-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="cyberarmor-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="default",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="kube-node-lease",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="kube-public",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="kube-system",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Network policies"
kubescape_object_failed_count{framework="ArmoBest",control="Network policies",name="nginx-ingress",groupVersionKind="v1/Namespace"} 1
# Number of resources found as part of ArmoBest control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_found_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 36
# Number of resources excluded as part of ArmoBest control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_excluded_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 0
# Number of resources failed as part of ArmoBest control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 1
# Failed object from "ArmoBest" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="ArmoBest",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
# Number of resources found as part of ArmoBest control No impersonation
kubescape_resources_found_count{framework="ArmoBest",control="No impersonation"} 74
# Number of resources excluded as part of ArmoBest control No impersonation
kubescape_resources_excluded_count{framework="ArmoBest",control="No impersonation"} 0
# Number of resources failed as part of ArmoBest control No impersonation
kubescape_resources_failed_count{framework="ArmoBest",control="No impersonation"} 4
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "No impersonation"
kubescape_object_failed_count{framework="ArmoBest",control="No impersonation",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Number of resources found as part of ArmoBest control Portforwarding privileges
kubescape_resources_found_count{framework="ArmoBest",control="Portforwarding privileges"} 74
# Number of resources excluded as part of ArmoBest control Portforwarding privileges
kubescape_resources_excluded_count{framework="ArmoBest",control="Portforwarding privileges"} 0
# Number of resources failed as part of ArmoBest control Portforwarding privileges
kubescape_resources_failed_count{framework="ArmoBest",control="Portforwarding privileges"} 8
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="cyberarmor-system",name="ca-controller-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="generic-garbage-collector",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="namespace-controller",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="kube-system",name="default",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="armo-system",name="armo-kubescape-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",namespace="armo-system",name="armo-scanner-service-account",groupVersionKind="/ServiceAccount"} 1
# Failed object from "ArmoBest" control "Portforwarding privileges"
kubescape_object_failed_count{framework="ArmoBest",control="Portforwarding privileges",name="system:masters",groupVersionKind="rbac.authorization.k8s.io/Group"} 1
# Number of resources found as part of ArmoBest control Image pull policy on latest image tag
kubescape_resources_found_count{framework="ArmoBest",control="Image pull policy on latest image tag"} 22
# Number of resources excluded as part of ArmoBest control Image pull policy on latest image tag
kubescape_resources_excluded_count{framework="ArmoBest",control="Image pull policy on latest image tag"} 0
# Number of resources failed as part of ArmoBest control Image pull policy on latest image tag
kubescape_resources_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag"} 2
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="armo-system",name="armo-kubescape",groupVersionKind="batch/v1/CronJob"} 1
# Failed object from "ArmoBest" control "Image pull policy on latest image tag"
kubescape_object_failed_count{framework="ArmoBest",control="Image pull policy on latest image tag",namespace="armo-system",name="armo-scan-scheduler",groupVersionKind="batch/v1/CronJob"} 1
# Number of resources found as part of ArmoBest control Namespace without service accounts
kubescape_resources_found_count{framework="ArmoBest",control="Namespace without service accounts"} 54
# Number of resources excluded as part of ArmoBest control Namespace without service accounts
kubescape_resources_excluded_count{framework="ArmoBest",control="Namespace without service accounts"} 0
# Number of resources failed as part of ArmoBest control Namespace without service accounts
kubescape_resources_failed_count{framework="ArmoBest",control="Namespace without service accounts"} 3
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",name="kube-public",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",name="default",groupVersionKind="v1/Namespace"} 1
# Failed object from "ArmoBest" control "Namespace without service accounts"
kubescape_object_failed_count{framework="ArmoBest",control="Namespace without service accounts",name="kube-node-lease",groupVersionKind="v1/Namespace"} 1
# Number of resources found as part of cve-scanning control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_found_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 36
# Number of resources excluded as part of cve-scanning control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_excluded_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 0
# Number of resources failed as part of cve-scanning control CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability
kubescape_resources_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"} 1
# Failed object from "cve-scanning" control "CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability"
kubescape_object_failed_count{framework="cve-scanning",control="CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability",namespace="nginx-ingress",name="nginx-ingress",groupVersionKind="apps/v1/Deployment"} 1
