Kubernetes Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Kubernetes must remove old components after updated versions have been installed.
<VulnDiscussion>Previous versions of Kubernetes components that are not removed after updates have been installed may be exploited by adversa...Rule Medium Severity -
SRG-APP-000456-CTR-001125
<GroupDescription></GroupDescription>Group -
Kubernetes must contain the latest updates as authorized by IAVMs, CTOs, DTMs, and STIGs.
<VulnDiscussion>Kubernetes software must stay up to date with the latest patches, service packs, and hot fixes. Not updating the Kubernetes c...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes component manifests must be owned by root.
<VulnDiscussion>The Kubernetes manifests are those files that contain the arguments and settings for the Control Plane services. These servic...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes component etcd must be owned by etcd.
<VulnDiscussion>The Kubernetes etcd key-value store provides a way to store data to the Control Plane. If these files can be changed, data to...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes conf files must be owned by root.
<VulnDiscussion>The Kubernetes conf files contain the arguments and settings for the Control Plane services. These services are controller an...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.