Skip to content

Guide to the Secure Configuration of Red Hat OpenShift Container Platform 4

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Disable etcd Peer Self-Signed Certificates

    To ensure the <code>etcd</code> service is not using self-signed certificates, run the following command: <pre>$ oc get cm/etcd-pod -n openshift-et...
    Rule Medium Severity
  • Ensure That The etcd Peer Client Certificate Is Correctly Set

    To ensure the etcd service is serving TLS to peers, make sure the <code>etcd-pod*</code> ConfigMaps in the <code>openshift-etcd</code> namespace co...
    Rule Medium Severity
  • Enable The Peer Client Certificate Authentication

    To ensure the <code>etcd</code> service is serving TLS to clients, make sure the <code>etcd-pod*</code> <code>ConfigMaps</code> in the <code>opensh...
    Rule Medium Severity
  • Ensure That The etcd Peer Key File Is Correctly Set

    To ensure the etcd service is serving TLS to peers, make sure the <code>etcd-pod*</code> ConfigMaps in the <code>openshift-etcd</code> namespace co...
    Rule Medium Severity
  • Configure A Unique CA Certificate for etcd

    A unique CA certificate should be created for <code>etcd</code>. OpenShift by default creates separate PKIs for etcd and the Kubernetes API server...
    Rule Medium Severity
  • Kubernetes - General Security Practices

    Contains evaluations for general security practices for operating a Kubernetes environment.
    Group
  • Ensure the alert receiver is configured

    In OpenShift Container Platform, an alert is fired when the conditions defined in an alerting rule are true. An alert provides a notification that ...
    Rule Medium Severity
  • Streaming Connection Timeout Options

    Time until connection timeouts. Use (s) for seconds, (m) for minutes, and (h) for hours.
    Value
  • Ensure that a OpenShift OAuth login template or a classification banner is set

    A legal notice must be configured. <br> This is achievable via the OAuth object by creating a custom login page, storing it in a Kubernetes Secret...
    Rule Medium Severity
  • Enable Classification Banner on OpenShift Console

    A classification banner can be configured by creating a Console Notification CRD on OpenShift
    Rule Medium Severity
  • Ensure the notification is enabled for Compliance Operator

    The OpenShift platform provides the Compliance Operator for administrators to monitor compliance state of a cluster and provides them with an overv...
    Rule Medium Severity
  • Kubernetes Pod Logs Must Be Group Owned By Root

    All logs must be owned by root user and group and have permissions 755. By default, the path for the Kubernetes pod logs is
    /var/log/pods/
    .
    Rule Medium Severity
  • Ensure the notification is enabled for file integrity operator

    The OpenShift platform provides the File Integrity Operator to monitor for unwanted file changes, and this control ensures proper notification aler...
    Rule Medium Severity
  • Kubernetes Pod Logs Must Be Owned and Group Owned By Root and have permissions 755

    <p> All logs must be owned by root user and group and have permissions 755. By default, the path for the Kubernetes pod logs is <pre...
    Rule Medium Severity
  • Kubernetes Pod Logs Must Be Owned By Root

    All logs must be owned by root user and group. By default, the path for the Kubernetes audit log is <pre>/var/log/kube-apiserver/</pre>. To proper...
    Rule Medium Severity
  • Verify Permissions on the pod log files

    All logs must be owned by root user and group and have permissions 755. By default, the path for the Kubernetes pod logs is
    /var/log/pods/
    .
    Rule Medium Severity
  • Apply Security Context to Your Pods and Containers

    Apply Security Context to your Pods and Containers
    Rule Medium Severity
  • Manage Image Provenance Using ImagePolicyWebhook

    OpenShift administrators can control which images can be imported, tagged, and run in a cluster. There are two facilities for this purpose: (1) All...
    Rule Medium Severity
  • The default namespace should not be used

    Kubernetes provides a default namespace, where objects are placed if no namespace is specified for them. Placing objects in this namespace makes ap...
    Rule Medium Severity
  • Ensure Seccomp Profile Pod Definitions

    Enable default seccomp profiles in your pod definitions.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules