Guide to the Secure Configuration of Red Hat OpenShift Container Platform 4
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Verify Permissions on the pod log files
All logs must be owned by root user and group and have permissions 755. By default, the path for the Kubernetes pod logs is/var/log/pods/
.Rule Medium Severity -
Apply Security Context to Your Pods and Containers
Apply Security Context to your Pods and ContainersRule Medium Severity -
The default namespace should not be used
Kubernetes provides a default namespace, where objects are placed if no namespace is specified for them. Placing objects in this namespace makes application of RBAC and other controls more difficult.Rule Medium Severity -
Ensure Seccomp Profile Pod Definitions
Enabledefault
seccomp profiles in your pod definitions.Rule Medium Severity -
Create administrative boundaries between resources using namespaces
Use namespaces to isolate your Kubernetes objects.Rule Medium Severity -
Ensure that GitOps Operator is deployed
Red Hat OpenShift GitOps is a declarative continuous delivery platform based on Argo CD. It enables teams to adopt GitOps principles for managing cluster configurations and automating secure and re...Rule Medium Severity -
Ensure that the kubeadmin secret has been removed
The kubeadmin user is meant to be a temporary user used for bootstrapping purposes. It is preferable to assign system administrators whose users are backed by an Identity Provider. <br> Make sure ...Rule Medium Severity -
Ensure that the OpenShift OAuth login template is set
A legal notice can be configured via a customized login template. <br> This is achievable via the OAuth object by creating a custom login page, storing it in a Kubernetes Secret and referencing it...Rule Medium Severity -
Ensure that the OpenShift OAuth provider selection is set
Custom login pages can be helpful to show users a branded page that they trust and expect before being redirected to the authentication provider. <br> This is achievable via the OAuth object by cr...Rule Medium Severity -
Ensure That The kubelet Client Certificate Is Correctly Set
To ensure the kubelet TLS client certificate is configured, edit the kubelet configuration file <code>/etc/kubernetes/kubelet.conf</code> and configure the kubelet certificate file. <pre>tlsCertFil...Rule Medium Severity -
Ensure that project templates autocreate Resource Quotas
<p> Configure a template for newly created projects to use default resource quotas and make sure this template is referenced from the default project template. </p> <p>...Rule Medium Severity -
Ensure that project config references a project template
The OpenShift Container Platform API server automatically provisions new projects based on the project template that is identified by the <code>projectRequestTemplate</code> parameter in the cluste...Rule Medium Severity -
Ensure that project templates autocreate Resource Quotas
Configure a template for newly created projects to use default resource quotas and make sure this template is referenced from the default project template. For more information, follow <a href="ht...Rule Medium Severity -
Ensure that all daemonsets has resource limits
When deploying an application, it is important to tune based on memory and CPU consumption, allocating enough resources for the application to function properly. Images provided by OpenShift Dedica...Rule Medium Severity -
Ensure That The kubelet Client Certificate Is Correctly Set
To ensure the kubelet TLS client certificate is configured, edit the kubelet configuration file <code>/etc/kubernetes/kubelet.conf</code> and configure the kubelet certificate file. <pre>tlsCertFil...Rule Medium Severity -
Ensure that all deployments has resource limits
When deploying an application, it is important to tune based on memory and CPU consumption, allocating enough resources for the application to function properly. Images provided by OpenShift Dedica...Rule Medium Severity -
Ensure that all statefulsets has resource limits
When deploying an application, it is important to tune based on memory and CPU consumption, allocating enough resources for the application to function properly. Images provided by OpenShift Dedica...Rule Medium Severity -
Ensure workloads use resource requests and limits per namespace
There are two ways to enable resource requests and limits. To create either: A multi-project quota, defined by a ClusterResourceQuota object, allows quotas to be shared across multiple projects. ...Rule Medium Severity -
Ensure TLS v1.2 is minimum for Openshift APIServer
Verify tls version for the openshift APIServer.Rule Medium Severity -
Ensure TLS v1.2 is minimum for Openshift Router
Verify tls version for the Openshift Router.Rule Medium Severity -
This is a helper rule to fetch the required api resource for detecting HyperShift OCP version
no descriptionRule Medium Severity -
This is a helper rule to fetch the required api resource for detecting OCP version
no descriptionRule Medium Severity -
Kubernetes Kubelet Settings
The Kubernetes Kubelet is an agent that runs on each node in the cluster. It makes sure that containers are running in a pod. The kubelet takes a set of PodSpecs that are provided through various ...Group -
Configure Kubelet Event Limit
Maximum event creations per second.Value -
Configure Kubelet EvictionHard Image FS Available
Image FS Available for the EvictionHard threshold to trigger.Value -
Configure Kubelet EvictionHard Image FS inodes Free
Image FS inodes Free for the EvictionHard threshold to trigger.Value -
Configure Kubelet EvictionHard Memory Available
Memory Available for the EvictionHard threshold to trigger.Value -
Configure Kubelet EvictionHard NodeFS Available
Node FS Available for the EvictionHard threshold to trigger.Value -
Configure Kubelet EvictionHard Node FS inodes Free
Node FS inodes Free for the EvictionHard threshold to trigger.Value -
Configure Kubelet EvictionSoft Image FS Available
Image FS Available for the EvictionSoft threshold to trigger.Value -
Configure Kubelet EvictionSoft Image FS inodes Free
Image FS inodes Free for the EvictionSoft threshold to trigger.Value -
Configure Kubelet EvictionSoft Memory Available
Memory Available for the EvictionSoft threshold to trigger.Value -
Configure Kubelet EvictionSoft NodeFS Available
Node FS Available for the EvictionSoft threshold to trigger.Value -
Configure Kubelet EvictionSoft Node FS inodes Free
Node FS inodes Free for the EvictionSoft threshold to trigger.Value -
Configure Kubelet use of the Strong Cryptographic Ciphers
Cryptographic Ciphers Available for Kubelet, separated by commaValue -
Configure Kubelet use of the Strong Cryptographic Ciphers
Cryptographic Ciphers Available for KubeletValue -
Configure Kubelet to use secure TLS version
Secure version of TLS available for configuring KubeletValue -
Configure Kubelet to use secure TLS version
TLS versions available for configuring Kubelet, excluding insecure versionsValue -
Ensure authorization is set to Webhook
Unauthenticated/unauthorized users should have no access to OpenShift nodes. The Kubelet should be set to only allow Webhook authorization. To ensure that the Kubelet requires authorization, valida...Rule Medium Severity -
kubelet - Configure the Client CA Certificate
By default, the kubelet is not configured with a CA certificate which can subject the kubelet to man-in-the-middle attacks. To configure a client CA certificate, edit the kubelet configuration fil...Rule Medium Severity -
Ensure That The kubelet Server Key Is Correctly Set
To ensure the kubelet TLS private server key certificate is configured, edit the kubelet configuration file <code>/etc/kubernetes/kubelet.conf</code> and configure the kubelet private key file. <pr...Rule Medium Severity -
Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers
Ensure that the Kubelet is configured to only use strong cryptographic ciphers. To set the cipher suites for the kubelet, create new or modify existing <code>KubeletConfig</code> object along these...Rule Medium Severity -
Ensure that the Ingress Controller only makes use of Strong Cryptographic Ciphers
Ensure that the Ingress Controller is configured to only use strong cryptographic ciphers.Rule Medium Severity -
Ensure that the Kubernetes API Server Operator only makes use of Strong Cryptographic Ciphers
Ensure that the Kubernetes API Server Operator is configured to only use strong cryptographic ciphers.Rule Medium Severity -
Ensure that the OpenShift API Server Operator only makes use of Strong Cryptographic Ciphers
Ensure that the OpenShift API Server Operator is configured to only use strong cryptographic ciphers.Rule Medium Severity -
Ensure Kubelet is configured with allowed TLS versions
<p> The configuration <code>tlsSecurityProfile</code> specifies TLS configurations to be used while establishing connections with the externally exposed servers. Though secure transp...Rule Medium Severity -
kubelet - Hostname Override handling
Normally, OpenShift lets the kubelet get the hostname from either the cloud provider itself, or from the node's hostname. This ensures that the PKI allocated by the deployment uses the appropriate ...Rule Low Severity -
Configure the OpenShift Audit Profile
Audit log profiles define how to log requests that come to the OpenShift API server, the Kubernetes API server, and the OAuth API server.Value -
kubelet - Enable Certificate Rotation
To enable the kubelet to rotate client certificates, edit the kubelet configuration file <code>/etc/kubernetes/kubelet.conf</code> on the kubelet node(s) and set the below parameter: <pre> ... rota...Rule Medium Severity -
kubelet - Enable Client Certificate Rotation
To enable the kubelet to rotate client certificates, edit the kubelet configuration file <code>/etc/kubernetes/kubelet.conf</code> on the kubelet node(s) and set the below parameter: <pre> featureG...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.