You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+11-1Lines changed: 11 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -119,7 +119,9 @@ $ mkat eks test-imds-access
119
119
2023/04/12 00:35:15 IMDS is accessible and allows any pod to retrieve credentials for the AWS role eksctl-mkat-cluster-nodegroup-ng-NodeInstanceRole-AXWUFF35602Z
120
120
```
121
121
122
-
## How does MKAT compare to other tools?
122
+
## FAQ
123
+
124
+
### How does MKAT compare to other tools?
123
125
124
126
|**Tool**|**Description**|
125
127
|:---:|:---:|
@@ -132,10 +134,18 @@ $ mkat eks test-imds-access
132
134
| [kubeletmein](https://github.com/4ARMED/kubeletmein) | kubeletmein _is_ specific to managed K8s environments. It's an utility to generate a kubeconfig file using the node's IAM credentials, to then use it in a compromised pod. |
133
135
| [hardeneks](https://github.com/aws-samples/hardeneks) | hardeneks _is_ specific to managed K8s environments, but only for EKS. It identifies issues and lack of best practices inside of the cluster, and does not focus on cluster to cloud pivots. |
134
136
137
+
### What permissions does MKAT need to run?
138
+
139
+
See [this page](./permissions.md) for a detailed list of the permissions MKAT needs to run.
140
+
135
141
## Roadmap
136
142
137
143
We currently plan to:
138
144
* Add a feature to identify EKS pods that are exposed through an AWS load balancer, through the [aws-load-balancer-controller](https://github.com/kubernetes-sigs/aws-load-balancer-controller)
139
145
* Add support for GCP GKE
140
146
* Allow scanning for additional types of cloud credentials
141
147
* Enhance the IAM role trust policy evaluation logic to take into account additional edge cases
148
+
149
+
## Acknowledgements
150
+
151
+
Thank you to Rami McCarthi and Mikail Tunç for their early testing and actionable feedback on MKAT!
eksCommand.PersistentFlags().BoolVarP(&skipEksHostnameCheck, "skip-eks-hostname-check", "", false, "Don't check that the hostname of your current API server ends with .eks.amazonaws.com")
eksRoleRelationshipsCommand.Flags().StringVarP(&outputFile, "output-file", "o", "", "Output file. If not specified, output will be printed to stdout.")
65
+
eksRoleRelationshipsCommand.Flags().StringVarP(&eksClusterName, "eks-cluster-name", "", "", "When the EKS cluster name cannot be automatically detected from your KubeConfig, specify this argument to pass the EKS cluster name of your current kubectl context")
66
+
61
67
returneksRoleRelationshipsCommand
62
68
}
63
69
64
70
// Actual logic implementing the "find-role-relationships" command
0 commit comments