Skip to content

Guide to the Secure Configuration of Red Hat OpenShift Container Platform 4

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Verify Permissions on the Open vSwitch Persistent System ID

    To properly set the permissions of /etc/openvswitch/system-id.conf, run the command:
    $ sudo chmod 0644 /etc/openvswitch/system-id.conf
    Rule Medium Severity
  • Verify Permissions on the Open vSwitch Daemon PID File

    To properly set the permissions of /run/openvswitch/ovs-vswitchd.pid, run the command:
    $ sudo chmod 0644 /run/openvswitch/ovs-vswitchd.pid
    Rule Medium Severity
  • Verify Permissions on the Open vSwitch Database Server PID

    To properly set the permissions of /run/openvswitch/ovsdb-server.pid, run the command:
    $ sudo chmod 0644 /run/openvswitch/ovsdb-server.pid
    Rule Medium Severity
  • Verify Permissions on the Kubernetes Scheduler Kubeconfig File

    To properly set the permissions of <code>/etc/kubernetes/static-pod-resources/kube-scheduler-pod-*/configmaps/scheduler-kubeconfig/kubeconfig</code>, run the command: <pre>$ sudo chmod 0600 /etc/k...
    Rule Medium Severity
  • The OpenShift etcd Data Directory Must Have Mode 0700

    To properly set the permissions of /var/lib/etcd, run the command:
    $ sudo chmod 0700 /var/lib/etcd
    Rule Medium Severity
  • Verify Permissions on the OpenShift SDN CNI Server Config

    To properly set the permissions of /var/run/openshift-sdn/cniserver/config.json, run the command:
    $ sudo chmod 0444 /var/run/openshift-sdn/cniserver/config.json
    Rule Medium Severity
  • Kubernetes - Network Configuration and Firewalls

    Most systems must be connected to a network of some sort, and this brings with it the substantial risk of network attack. This section discusses the security impact of decisions about networking wh...
    Group
  • Verify User Who Owns The OpenShift Node Service File

    ' To properly set the owner of /etc/systemd/system/kubelet.service, run the command:
    $ sudo chown root /etc/systemd/system/kubelet.service 
    '
    Rule Medium Severity
  • Ensure that the CNI in use supports Network Policies

    There are a variety of CNI plugins available for Kubernetes. If the CNI in use does not support Network Policies it may not be possible to effectively restrict traffic in the cluster. OpenShift sup...
    Rule High Severity
  • Ensure that HyperShift Hosted Namespaces have Network Policies defined.

    Use network policies to isolate traffic in your cluster network.
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules