Skip to content

Discovery

Sidereal scans your cluster for existing security controls and generates probe recommendations. The ISSO’s first interaction is reviewing and promoting recommendations, not authoring YAML from scratch.

The discovery reconciler runs automatically on controller startup and every 6 hours (configurable by impact level). It scans for:

Cluster ResourceGenerated Probe Type
NetworkPolicynetpol probes for each policy’s deny/allow paths
RoleBinding / ClusterRoleBindingrbac probes for permission boundary verification
ValidatingWebhookConfigurationadmission probes for policy enforcement validation
Secrets (by namespace)secret probes for cross-namespace isolation
Falco rules / Tetragon TracingPolicydetection probes for technique coverage
Terminal window
kubectl get siderealproberecommendations -n sidereal-system

Short name:

Terminal window
kubectl get sprec -n sidereal-system

Each recommendation includes:

  • confidence: high (fully derivable), medium (review recommended), low (skeleton requiring completion)
  • rationale: why this probe was generated
  • probeTemplate: the complete SiderealProbe spec that would be created
Terminal window
kubectl describe sprec <name> -n sidereal-system

Promoting creates a SiderealProbe from the recommendation’s template. The probe starts in dryRun mode:

Terminal window
kubectl patch sprec <name> -n sidereal-system \
--type merge --subresource status \
-p '{"status":{"state":"promoted","promotedTo":"<probe-name>"}}'
Terminal window
kubectl patch sprec <name> -n sidereal-system \
--type merge --subresource status \
-p '{"status":{"state":"dismissed","dismissedBy":"isso@agency.gov","dismissedReason":"Not applicable to this environment"}}'

Dismissed recommendations are not re-generated for the same source resource unless the resource changes.

When a source resource changes (e.g., a NetworkPolicy is modified), the old recommendation is automatically marked superseded and a new one is created with the updated configuration.

For an offline preview without creating recommendations in the cluster:

Terminal window
# Preview what would be discovered
sidereal discover --dry-run
# Discover only NetworkPolicy probes
sidereal discover --type netpol --namespace production
# Output SiderealProbe YAML for direct kubectl apply
sidereal discover --output probes/

The CLI outputs SiderealProbe resources (not recommendations) for manual review and kubectl apply.