Ensure that application Namespaces have Network Policies defined.
Harden SSH client Crypto Policy
The Installed Operating System Is FIPS 140-2 Certified
Ensure that FIPS mode is enabled on all cluster nodes
Configure the Client Certificate Authority for the API Server
Configure the etcd Certificate Authority for the API Server
Configure the etcd Certificate for the API Server
Configure the etcd Certificate Key for the API Server
Ensure that the --kubelet-https argument is set to true
Configure the kubelet Certificate Authority for the API Server
Configure the kubelet Certificate File for the API Server
Configure the kubelet Certificate Key for the API Server
Ensure the openshift-oauth-apiserver service uses TLS
Configure the Certificate for the API Server
Configure the Certificate Key for the API Server
Configure An Identity Provider
Configure OAuth server so that tokens expire after a set period of inactivity
Configure OAuth tokens to expire after a set period of inactivity
Configure OAuth clients so that tokens expire after a set period of inactivity
Do Not Use htpasswd-based IdP
Only Use LDAP-based IdPs with TLS
Ensure Controller insecure port argument is unset
Ensure that the RotateKubeletServerCertificate argument is set
Ensure Controller secure-port argument is set
Configure the Service Account Certificate Authority Key for the Controller Manager
Configure the Service Account Private Key for the Controller Manager
Disable etcd Self-Signed Certificates
Ensure That The etcd Client Certificate Is Correctly Set
Enable The Client Certificate Authentication
Ensure That The etcd Key File Is Correctly Set
Disable etcd Peer Self-Signed Certificates
Ensure That The etcd Peer Client Certificate Is Correctly Set
Enable The Peer Client Certificate Authentication
Ensure That The etcd Peer Key File Is Correctly Set
Ensure That The kubelet Client Certificate Is Correctly Set
Ensure That The kubelet Server Key Is Correctly Set
Ensure that Audit Log Errors Emit Alerts
Configure BIND to use System Crypto Policy
Configure System Cryptography Policy
Configure Kerberos to use System Crypto Policy
Configure Libreswan to use System Crypto Policy
Configure OpenSSL library to use System Crypto Policy
Configure SSH to use System Crypto Policy
Install the dracut-fips-aesni Package
Install the dracut-fips Package
Ensure '/etc/system-fips' exists
Enable FIPS Mode in GRUB2
Harden SSHD Crypto Policy
Ensure Red Hat GPG Key Installed
Require Authentication for Single User Mode
All GIDs referenced in /etc/passwd must be defined in /etc/group
Verify No netrc Files Exist
Verify Only Root Has UID 0
Direct root Logins Not Allowed
Restrict Serial Port Root Logins
Restrict Virtual Console Root Logins
Limit the Number of Concurrent Login Sessions Allowed Per User
Set Interactive Session Timeout
Ensure that User Home Directories are not Group-Writable or World-Readable
Ensure the Default Bash Umask is Set Correctly
Ensure the Default Umask is Set Correctly in login.defs
Ensure the Default Umask is Set Correctly in /etc/profile
System Audit Logs Must Have Mode 0750 or Less Permissive
System Audit Logs Must Be Owned By Root
Disable Ctrl-Alt-Del Burst Action
Disable Ctrl-Alt-Del Reboot Activation
Ensure that System Accounts Are Locked
Ensure the Default C Shell Umask is Set Correctly
Configure auditd mail_acct Action on Low Disk Space
Ensure Log Files Are Owned By Appropriate Group
Ensure Log Files Are Owned By Appropriate User
Ensure System Log Files Have Correct Permissions
System Audit Logs Must Have Mode 0640 or Less Permissive
Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
Disable Kernel Parameter for Accepting Source-Routed Packets on IPv4 Interfaces by Default
Configure Kernel Parameter for Accepting Secure Redirects By Default
Enable Kernel Parameter to Ignore ICMP Broadcast Echo Requests on IPv4 Interfaces
Enable Kernel Parameter to Ignore Bogus ICMP Error Responses on IPv4 Interfaces
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces
Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces by Default
Disable Kernel Parameter for IP Forwarding on IPv4 Interfaces
Verify that All World-Writable Directories Have Sticky Bits Set
Ensure No World-Writable Files Exist
Enable Kernel Parameter to Enforce DAC on Hardlinks
Enable Kernel Parameter to Enforce DAC on Symlinks
Verify Group Who Owns group File
Verify Group Who Owns gshadow File
Verify Group Who Owns passwd File
Verify Group Who Owns shadow File
Verify User Who Owns group File
Verify User Who Owns gshadow File
Verify User Who Owns passwd File
Verify User Who Owns shadow File
Verify Permissions on group File
Verify Permissions on gshadow File
Verify Permissions on passwd File
Verify Permissions on shadow File
Verify that System Executables Have Root Ownership
Verify that Shared Library Files Have Root Ownership
Verify that System Executables Have Restrictive Permissions
Verify that Shared Library Files Have Restrictive Permissions
Add nodev Option to /dev/shm
Add nosuid Option to /dev/shm
Restrict Exposed Kernel Pointer Addresses Access
Enable Randomized Layout of Virtual Address Space
Ensure SELinux State is Enforcing
Verify Group Who Owns SSH Server config file
Verify Owner on SSH Server config file
Verify Permissions on SSH Server config file
Verify Permissions on SSH Server Private *_key Key Files
Verify Permissions on SSH Server Public *.pub Key Files
Set SSH Client Alive Count Max to zero
Set SSH Client Alive Count Max
Set SSH Client Alive Interval
Disable Host-Based Authentication
Allow Only SSH Protocol 2
Enable Use of Strict Mode Checking
Enable Use of Privilege Separation
Configure Kernel to Rate Limit Sending of Duplicate TCP Acknowledgments
Add nodev Option to /boot
Add nosuid Option to /boot
Add noexec Option to /dev/shm
Add nosuid Option to /home
Add nodev Option to Non-Root Local Partitions
Add nodev Option to Removable Media Partitions
Add noexec Option to Removable Media Partitions
Add nosuid Option to Removable Media Partitions
Add noexec Option to /tmp
Add nosuid Option to /tmp
Add nodev Option to /var/log/audit
Add noexec Option to /var/log/audit
Add nosuid Option to /var/log/audit
Add nodev Option to /var/log
Add noexec Option to /var/log
Add nosuid Option to /var/log
Ensure SELinux Not Disabled in the kernel arguments
Ensure SELinux Not Disabled in /etc/default/grub
Ensure No Daemons are Unconfined by SELinux
Enable Dracut FIPS Module
Set kernel parameter 'crypto.fips_enabled' to 1
Harden OpenSSL Crypto Policy
Configure Logind to terminate idle sessions after certain time of inactivity
The Kubernetes Audit Logs Directory Must Have Mode 0700
The OAuth Audit Logs Directory Must Have Mode 0700
The OpenShift Audit Logs Directory Must Have Mode 0700
Kubernetes Audit Logs Must Be Owned By Root
OAuth Audit Logs Must Be Owned By Root
OpenShift Audit Logs Must Be Owned By Root
Kubernetes Audit Logs Must Have Mode 0600
OAuth Audit Logs Must Have Mode 0600
OpenShift Audit Logs Must Have Mode 0600
Verify Permissions on the OpenShift PKI Private Key Files
Ensure that cluster-wide proxy is set
Ensure that the default Ingress CA (wildcard issuer) has been replaced
Ensure that all OpenShift Routes prefer TLS
Ensure that the bind-address parameter is not used
Ensure SUSE GPG Key Installed