Guide to the Secure Configuration of Red Hat OpenShift Container Platform 4
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Ensure the notification is enabled for Compliance Operator
The OpenShift platform provides the Compliance Operator for administrators to monitor compliance state of a cluster and provides them with an overv...Rule Medium Severity -
Kubernetes Pod Logs Must Be Group Owned By Root
All logs must be owned by root user and group and have permissions 755. By default, the path for the Kubernetes pod logs is/var/log/pods/
.Rule Medium Severity -
Ensure the notification is enabled for file integrity operator
The OpenShift platform provides the File Integrity Operator to monitor for unwanted file changes, and this control ensures proper notification aler...Rule Medium Severity -
Kubernetes Pod Logs Must Be Owned and Group Owned By Root and have permissions 755
<p> All logs must be owned by root user and group and have permissions 755. By default, the path for the Kubernetes pod logs is <pre...Rule Medium Severity -
Kubernetes Pod Logs Must Be Owned By Root
All logs must be owned by root user and group. By default, the path for the Kubernetes audit log is <pre>/var/log/kube-apiserver/</pre>. To proper...Rule Medium Severity -
Verify Permissions on the pod log files
All logs must be owned by root user and group and have permissions 755. By default, the path for the Kubernetes pod logs is/var/log/pods/
.Rule Medium Severity -
Apply Security Context to Your Pods and Containers
Apply Security Context to your Pods and ContainersRule Medium Severity -
Manage Image Provenance Using ImagePolicyWebhook
OpenShift administrators can control which images can be imported, tagged, and run in a cluster. There are two facilities for this purpose: (1) All...Rule Medium Severity -
The default namespace should not be used
Kubernetes provides a default namespace, where objects are placed if no namespace is specified for them. Placing objects in this namespace makes ap...Rule Medium Severity -
Ensure Seccomp Profile Pod Definitions
Enabledefault
seccomp profiles in your pod definitions.Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.