Skip to main content
Version: 3.13-dev

Namespace Configuration Audits

Configuration Audit Reports under Security > Namespace Security > Configuration Audits show Kubernetes resource misconfigurations in the selected namespace. You can open each resource to see failed checks, descriptions, and remediation steps.

Configuration Audit Reports​

The page title is Configuration Audit Reports, with a short description such as Kubernetes resource misconfigurations in namespace <namespace>. In the top right you can change the Namespace to filter reports.

Table​

Use the Columns control above the table to choose which columns are visible. The table includes:

ColumnDescription
Resource NameName of the Kubernetes resource (e.g. ReplicaSet name).
Resource KindKind of resource (e.g. ReplicaSet).
CriticalNumber of critical findings.
HighNumber of high-severity findings.
MediumNumber of medium-severity findings.
LowNumber of low-severity findings.
Total ChecksTotal number of checks run.
Last UpdatedDate and time of the last audit.

Each row has an eye icon (or similar) at the end to open Audit Details. Pagination at the bottom (e.g. "Rows per page: 25", "1–1 of 1") and navigation arrows let you move through the list.

Audit Details​

When you open a resource, the breadcrumbs show Security > Namespace Security > Configuration Audits > Audit Details.

  • Resource β€” Name and kind (e.g. webserver-bc6dbb848, ReplicaSet) in a highlighted block.
  • Scan summary β€” Namespace, Checks (total), Passed, Failed (e.g. "Checks: 3 Passed: 0 Failed: 3"), Scanner and version (e.g. Trivy v0.29.0), Last scan (date and time).
  • Severity counts β€” Badges for Critical, High, Medium, Low (e.g. "0 Critical", "3 High").

Audit Findings Table​

Above the table you can filter by Severity (e.g. "All severities") and Status (e.g. "All"). The Columns button customizes visible columns.

The table lists each finding with:

ColumnDescription
Check IDIdentifier of the check (e.g. KSV014, KSV118). Rows can be expanded to show full details.
TitleShort title (e.g. "Root file system is not read-only", "Default security context configured").
CategoryCategory of the check (e.g. "Kubernetes Security Check").
SeveritySeverity level (e.g. High), often with color.
StatusResult (e.g. Fail), often with an icon.

Expand a row to see:

  • Description β€” Why the check matters (e.g. an immutable root filesystem limits what attackers can write to disk).
  • Messages β€” Concrete instance of the issue (e.g. which container and resource should be changed).
  • Remediation β€” What to change to fix it (e.g. set containers[].securityContext.readOnlyRootFilesystem to true).

Use this view to understand each finding and apply the suggested remediation. Pagination at the bottom (e.g. "1–3 of 3", "Rows per page: 25") applies when there are many findings.