Guide to the Secure Configuration of Amazon Elastic Kubernetes Service
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Ensure Private Endpoint Access
Disable access to the Kubernetes API from outside the node network if it is not required.Rule Unknown Severity -
Ensure Cluster Private Nodes
Disable public IP addresses for cluster nodes, so that they only have private IP addresses. Private Nodes are nodes with no public IP addresses.Rule Unknown Severity -
Kubernetes - Registry Security Practices
Contains evaluations for Kubernetes registry security practices, and cluster-wide registry configuration.Group -
Only use approved container registries
Use approved container registries.Rule Unknown Severity -
Ensure Image Vulnerability Scanning
Scan images being deployed to Amazon EKS for vulnerabilities.Rule Unknown Severity -
Ensure Cluster Service Account with read-only access to Amazon ECR
Configure the Cluster Service Account with Storage Object Viewer Role to only allow read- only access to Amazon ECR.Rule Unknown Severity -
Minimize user access to Amazon ECR
Restrict user access to Amazon ECR, limiting interaction with build images to only authorized personnel and service accounts.Rule Unknown Severity -
Kubernetes Secrets Management
Secrets let you store and manage sensitive information, such as passwords, OAuth tokens, and ssh keys. Such information might otherwise be put in a Pod specification or in an image.Group -
Ensure Kubernetes Secrets are Encrypted
Encrypt Kubernetes secrets, stored in etcd, using secrets encryption feature during Amazon EKS cluster creation.Rule Unknown Severity -
Kubernetes - Worker Node Settings
Contains evaluations for the worker node configuration settings.Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules