Kubernetes Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000033-CTR-000095
<GroupDescription></GroupDescription>Group -
The Kubernetes kubelet must enable explicit authorization.
<VulnDiscussion>Kubelet is the primary agent on each node. The API server communicates with each kubelet to perform tasks such as starting/st...Rule High Severity -
SRG-APP-000033-CTR-000095
<GroupDescription></GroupDescription>Group -
Kubernetes Worker Nodes must not have sshd service running.
<VulnDiscussion>Worker Nodes are maintained and monitored by the Control Plane. Direct access and manipulation of the nodes should not take p...Rule Medium Severity -
SRG-APP-000033-CTR-000095
<GroupDescription></GroupDescription>Group -
Kubernetes Worker Nodes must not have the sshd service enabled.
<VulnDiscussion>Worker Nodes are maintained and monitored by the Control Plane. Direct access and manipulation of the nodes must not take pla...Rule Medium Severity -
SRG-APP-000033-CTR-000095
<GroupDescription></GroupDescription>Group -
Kubernetes dashboard must not be enabled.
<VulnDiscussion>While the Kubernetes dashboard is not inherently insecure on its own, it is often coupled with a misconfiguration of Role-Bas...Rule Medium Severity -
SRG-APP-000033-CTR-000090
<GroupDescription></GroupDescription>Group -
Kubernetes Kubectl cp command must give expected access and results.
<VulnDiscussion>One of the tools heavily used to interact with containers in the Kubernetes cluster is kubectl. The command is the tool Syste...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules