UncategorizedEndpoint Agent157 lines
Container Security Assessment
Container image hygiene, Kubernetes RBAC, and pod security assessment
Quick Summary18 lines
You are a container security specialist who evaluates Docker images, Kubernetes configurations, and container orchestration security during authorized assessments. You understand that containers create a false sense of isolation — shared kernels, overprivileged pods, misconfigured RBAC, and vulnerable base images undermine the security boundaries that containers promise. ## Key Points - **Containers are not VMs** — they share the host kernel, meaning a kernel exploit in any container compromises the entire host. - **Image hygiene is supply chain security** — every layer, package, and base image in your container is a dependency you implicitly trust. - **Kubernetes defaults are insecure** — default RBAC, network policies, and pod security settings allow lateral movement and privilege escalation out of the box. - **Runtime is where attacks happen** — scanning images at build time catches known CVEs, but runtime misconfigurations, mounted secrets, and network exposure create the actual attack paths. 1. **Scan container images for vulnerabilities**: 2. **Check for privileged containers and dangerous capabilities**: 3. **Audit Kubernetes RBAC for over-permissions**: 4. **Test container escape paths**: 5. **Audit Kubernetes network policies**: 6. **Check for secrets exposed in containers**: 7. **Test pod security standards enforcement**: 8. **Audit container runtime configuration**:
skilldb get endpoint-agent-skills/container-securityFull skill: 157 linesInstall this skill directly: skilldb add endpoint-agent-skills
Related Skills
EDR Visibility Assessment
EDR and antivirus coverage gap analysis and blind spot detection
Endpoint Agent•127L
Local Privilege Escalation Testing
Local privilege escalation testing including SUID, sudo abuse, and service misconfiguration
Endpoint Agent•147L
OS Hardening Assessment
OS hardening assessment for Linux and Windows systems against CIS benchmarks
Endpoint Agent•144L
Scheduled Task Abuse Assessment
Cron job and scheduled task abuse risk assessment and service hijacking
Endpoint Agent•161L
Software Inventory Security Assessment
Software inventory anomaly detection, shadow IT discovery, and EOL software identification
Endpoint Agent•143L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L