Kubernetes Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Kubernetes kubelet KubeConfig must have file permissions set to 644 or more restrictive.
<VulnDiscussion>The Kubernetes kubelet agent registers nodes with the API Server, mounts volume storage for pods, and performs health checks ...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes kubelet KubeConfig file must be owned by root.
<VulnDiscussion>The Kubernetes kubelet agent registers nodes with the API server and performs health checks to containers within pods. If the...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes kubeadm.conf must be owned by root.
<VulnDiscussion>The Kubernetes kubeeadm.conf contains sensitive information regarding the cluster nodes configuration. If this file can be mo...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
Kubernetes API Server audit logs must be enabled.
<VulnDiscussion>Kubernetes API Server validates and configures pods and services for the API object. The REST operation provides frontend fun...Rule Medium Severity -
SRG-APP-000516-CTR-001335
<GroupDescription></GroupDescription>Group -
The Kubernetes API Server must be set to audit log max size.
<VulnDiscussion>The Kubernetes API Server must be set for enough storage to retain log information over the period required. When audit logs ...Rule Medium Severity -
SRG-APP-000516-CTR-001335
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules