Skip to content

Standardized Terminology

This document establishes consistent terminology for the Secure CINC Auditor Kubernetes Container Scanning project to ensure clarity and cohesion across all documentation.

Scanning Approaches

Official Term Description Status Aliases to Avoid
Kubernetes API Approach Direct API-based scanning through the Kubernetes API using the train-k8s-container plugin Enterprise Recommended Standard Scanning, Modified Plugin
Debug Container Approach Ephemeral debug container with chroot-based scanning for distroless containers Interim Solution Ephemeral Container Approach
Sidecar Container Approach CINC Auditor sidecar container with shared process namespace Interim Solution Process Namespace Approach

Container Types

Term Description
Standard Container Container with a shell and basic utilities (e.g., busybox, alpine, ubuntu)
Distroless Container Minimal container without shell or package manager (e.g., Google's distroless images)

Security Components

Term Description
Least Privilege RBAC Role-based access control configured to provide only the minimal permissions needed
Dynamic Access Control Time-limited, targeted access granted only for the duration of a scan
Label-based RBAC RBAC permissions scoped to pods with specific labels
Name-based RBAC RBAC permissions scoped to specific named resources

Deployment Methods

Term Description
Shell Script Approach Using the provided shell scripts for direct deployment and scanning
Helm Chart Approach Using the modular Helm charts for declarative deployment
CI/CD Integration Integration with GitHub Actions or GitLab CI for automated scanning

Technical Terms

Term Description Preferred Over
CINC Auditor Open source distribution of Chef InSpec InSpec
train-k8s-container Transport plugin for CINC Auditor to scan Kubernetes containers
SAF CLI MITRE Security Automation Framework Command Line Interface
Threshold Configuration YAML or JSON configuration for defining compliance requirements

Strategic Descriptions

When describing the approaches, use these consistent formulations:

Kubernetes API Approach

"The Kubernetes API Approach is our recommended enterprise solution, using the train-k8s-container plugin for direct API-based scanning. This approach will provide universal container scanning capability once distroless support is fully implemented."

Debug Container Approach

"The Debug Container Approach is an interim solution for scanning distroless containers, using ephemeral debug containers with chroot-based filesystem access. This approach requires Kubernetes clusters with ephemeral container support enabled."

Sidecar Container Approach

"The Sidecar Container Approach is an interim solution that works universally across Kubernetes versions, deploying a scanner container alongside the target container with shared process namespace. This approach requires deploying containers specifically with the sidecar configuration."