Skip to content

Guide to the Secure Configuration of Red Hat OpenShift Container Platform 4

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Configure A Unique CA Certificate for etcd

    A unique CA certificate should be created for <code>etcd</code>. OpenShift by default creates separate PKIs for etcd and the Kubernetes API server. The same is done for other points of communicati...
    Rule Medium Severity
  • Kubernetes - General Security Practices

    Contains evaluations for general security practices for operating a Kubernetes environment.
    Group
  • Ensure the alert receiver is configured

    In OpenShift Container Platform, an alert is fired when the conditions defined in an alerting rule are true. An alert provides a notification that a set of circumstances are apparent within a clust...
    Rule Medium Severity
  • Streaming Connection Timeout Options

    Time until connection timeouts. Use (s) for seconds, (m) for minutes, and (h) for hours.
    Value
  • Enable Classification Banner on OpenShift Console

    A classification banner can be configured by creating a Console Notification CR on OpenShift
    Rule Medium Severity
  • Ensure the notification is enabled for Compliance Operator

    The OpenShift platform provides the Compliance Operator for administrators to monitor compliance state of a cluster and provides them with an overview of gaps and ways to remediate them, and this ...
    Rule Medium Severity
  • Kubernetes Pod Logs Must Be Group Owned By Root

    All logs must be owned by root user and group and have permissions 755. By default, the path for the Kubernetes pod logs is
    /var/log/pods/
    .
    Rule Medium Severity
  • Ensure the notification is enabled for file integrity operator

    The OpenShift platform provides the File Integrity Operator to monitor for unwanted file changes, and this control ensures proper notification alert is enabled so that system administrators and sec...
    Rule Medium Severity
  • Kubernetes Pod Logs Must Be Owned and Group Owned By Root and have permissions 755

    <p> All logs must be owned by root user and group and have permissions 755. By default, the path for the Kubernetes pod logs is <pre>/var/log/pods/</pre>. </p> <p> If a...
    Rule Medium Severity
  • Kubernetes Pod Logs Must Be Owned By Root

    All logs must be owned by root user and group. By default, the path for the Kubernetes audit log is <pre>/var/log/kube-apiserver/</pre>. To properly set the owner of <code>/var/log/pods/*</code>, ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules