AKS Dashboard Is Enabled
- Query id: c62d3b92-9a11-4ffd-b7b7-6faaae83faed
- Query name: AKS Dashboard Is Enabled
- Platform: AzureResourceManager
- Severity: Low
- Category: Insecure Configurations
- URL: Github
Description¶
Azure Kubernetes Service should have the Kubernetes dashboard disabled.
Documentation
Code samples¶
Code samples with security vulnerabilities¶
Positive test num. 1 - json file
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"addonProfiles": {
"kubeDashboard": {
"enabled": true
}
},
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
]
}
Positive test num. 2 - json file
{
"properties": {
"template": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"addonProfiles": {
"kubeDashboard": {
"enabled": true
}
},
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
],
"outputs": {}
},
"parameters": {}
},
"kind": "template",
"type": "Microsoft.Blueprint/blueprints/artifacts",
"name": "myTemplate"
}
Code samples without security vulnerabilities¶
Negative test num. 1 - json file
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"addonProfiles": {
"kubeDashboard": {
"enabled": false
}
},
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
]
}
Negative test num. 2 - json file
{
"properties": {
"template": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"addonProfiles": {
"kubeDashboard": {
"enabled": false
}
},
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
],
"outputs": {}
},
"parameters": {}
},
"kind": "template",
"type": "Microsoft.Blueprint/blueprints/artifacts",
"name": "myTemplate"
}
Negative test num. 3 - json file
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
]
}
Negative test num. 4 - json file
{
"properties": {
"template": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"resources": [
{
"name": "aksCluster1",
"type": "Microsoft.ContainerService/managedClusters",
"apiVersion": "2020-02-01",
"location": "[resourceGroup().location]",
"properties": {
"kubernetesVersion": "1.15.7",
"dnsPrefix": "dnsprefix",
"agentPoolProfiles": [
{
"name": "agentpool",
"count": 2,
"vmSize": "Standard_A1",
"osType": "Linux",
"storageProfile": "ManagedDisks"
}
],
"linuxProfile": {
"adminUsername": "adminUserName",
"ssh": {
"publicKeys": [
{
"keyData": "keyData"
}
]
}
},
"servicePrincipalProfile": {
"clientId": "servicePrincipalAppId",
"secret": "servicePrincipalAppPassword"
},
"networkProfile": {
"networkPolicy": "azure"
}
}
}
],
"outputs": {}
},
"parameters": {}
},
"kind": "template",
"type": "Microsoft.Blueprint/blueprints/artifacts",
"name": "myTemplate"
}