Skip to content

Guide to the Secure Configuration of Red Hat OpenShift Container Platform 4

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Ensure IngressController is configured to use secure tlsSecurityProfile

    <p> The configuration <code>tlsSecurityProfile</code> specifies TLS configurations to be used while establishing connections with th...
    Rule Medium Severity
  • Ensure custom tlsSecurityProfile configured for IngressController uses secure TLS version

    The configuration <code>tlsSecurityProfile</code> specifies TLS configurations to be used while establishing connections with the externally expose...
    Rule Medium Severity
  • Ensure IngressController is not configured to use Old tlsSecurityProfile

    The configuration <code>tlsSecurityProfile</code> specifies TLS configurations to be used while establishing connections with the externally expose...
    Rule Medium Severity
  • Ensure that project templates autocreate Network Policies

    Configure a template for newly created projects to use default network policies and make sure this template is referenced from the default project ...
    Rule Medium Severity
  • Ensure that project templates autocreate Network Policies

    Configure a template for newly created projects to use default network policies. For more information, follow <a href="https://docs.openshift.com/c...
    Rule Medium Severity
  • Ensure that all Routes has rate limit enabled

    OpenShift has an option to set the IP whitelist for Routes [1] when creating new Routes. All routes outside the openshift namespaces and the kube ...
    Rule Medium Severity
  • Ensure that all OpenShift Routes prefer TLS

    OpenShift Container Platform provides methods for communicating from outside the cluster with services running in the cluster. TLS must be used to ...
    Rule Medium Severity
  • Configure the OpenShift API Server Maximum Retained Audit Logs

    To configure how many rotations of audit logs are retained, edit the <code>openshift-apiserver</code> configmap and set the <code>audit-log-maxback...
    Rule Low Severity
  • Configure OpenShift API Server Maximum Audit Log Size

    To rotate audit logs upon reaching a maximum size, edit the <code>openshift-apiserver</code> configmap and set the <code>audit-log-maxsize</code> p...
    Rule Medium Severity
  • Configure the Audit Log Path

    To enable auditing on the OpenShift API Server, the audit log path must be set. Edit the <code>openshift-apiserver</code> configmap and set the <co...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules