Kubernetes Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Kubernetes Kubelet certificate authority must be owned by root.
The Kubernetes kube proxy kubeconfig contain the argument and setting for the Control Planes. These settings contain network rules for restricting network communication between pods, clusters, and ...Rule Medium Severity -
SRG-APP-000516-CTR-001325
Group -
The Kubernetes component PKI must be owned by root.
The Kubernetes PKI directory contains all certificates (.crt files) supporting secure network communications in the Kubernetes Control Plane. If these files can be modified, data traversing within ...Rule Medium Severity -
SRG-APP-000516-CTR-001325
Group -
The Kubernetes kubelet KubeConfig must have file permissions set to 644 or more restrictive.
The Kubernetes kubelet agent registers nodes with the API Server, mounts volume storage for pods, and performs health checks to containers within pods. If these files can be modified, the informati...Rule Medium Severity -
SRG-APP-000516-CTR-001325
Group -
The Kubernetes kubelet KubeConfig file must be owned by root.
The Kubernetes kubelet agent registers nodes with the API server and performs health checks to containers within pods. If these files can be modified, the information system would be unaware of pod...Rule Medium Severity -
SRG-APP-000516-CTR-001325
Group -
The Kubernetes kubeadm.conf must be owned by root.
The Kubernetes kubeeadm.conf contains sensitive information regarding the cluster nodes configuration. If this file can be modified, the Kubernetes Platform Plane would be degraded or compromised f...Rule Medium Severity -
SRG-APP-000516-CTR-001325
Group -
SRG-APP-000516-CTR-001335
Group -
The Kubernetes API Server must be set to audit log max size.
The Kubernetes API Server must be set for enough storage to retain log information over the period required. When audit logs are large in size, the monitoring service for events becomes degraded. T...Rule Medium Severity -
SRG-APP-000516-CTR-001335
Group -
The Kubernetes API Server must be set to audit log maximum backup.
The Kubernetes API Server must set enough storage to retain logs for monitoring suspicious activity and system misconfiguration, and provide evidence for Cyber Security Investigations.Rule Medium Severity -
SRG-APP-000516-CTR-001335
Group -
The Kubernetes API Server audit log retention must be set.
The Kubernetes API Server must set enough storage to retain logs for monitoring suspicious activity and system misconfiguration, and provide evidence for Cyber Security Investigations.Rule Medium Severity -
SRG-APP-000516-CTR-001335
Group -
The Kubernetes API Server audit log path must be set.
Kubernetes API Server validates and configures pods and services for the API object. The REST operation provides frontend functionality to the cluster share state. Audit logs are necessary to provi...Rule Medium Severity -
SRG-APP-000516-CTR-001335
Group -
The Kubernetes PKI CRT must have file permissions set to 644 or more restrictive.
The Kubernetes PKI directory contains all certificates (.crt files) supporting secure network communications in the Kubernetes Control Plane. If these files can be modified, data traversing within ...Rule Medium Severity -
SRG-APP-000516-CTR-001335
Group -
The Kubernetes PKI keys must have file permissions set to 600 or more restrictive.
The Kubernetes PKI directory contains all certificate key files supporting secure network communications in the Kubernetes Control Plane. If these files can be modified, data traversing within the ...Rule Medium Severity -
Kubernetes Kubelet must not disable timeouts.
Idle connections from the Kubelet can be used by unauthorized users to perform malicious activity to the nodes, pods, containers, and cluster within the Kubernetes Control Plane. Setting the stream...Rule Medium Severity -
SRG-APP-000439-CTR-001080
Group -
Kubernetes API Server must disable basic authentication to protect information in transit.
Kubernetes basic authentication sends and receives request containing username, uid, groups, and other fields over a clear text HTTP communication. Basic authentication does not provide any securit...Rule High Severity -
SRG-APP-000439-CTR-001080
Group -
Kubernetes API Server must disable token authentication to protect information in transit.
Kubernetes token authentication uses password known as secrets in a plaintext file. This file contains sensitive information such as token, username and user uid. This token is used by service acco...Rule High Severity -
SRG-APP-000439-CTR-001080
Group -
Kubernetes endpoints must use approved organizational certificate and key pair to protect information in transit.
Kubernetes control plane and external communication is managed by API Server. The main implementation of the API Server is to manage hardware resources for pods and container using horizontal or ve...Rule High Severity -
SRG-APP-000342-CTR-000775
Group -
SRG-APP-000342-CTR-000775
Group -
Kubernetes must enable PodSecurity admission controller on static pods and Kubelets.
PodSecurity admission controller is a component that validates and enforces security policies for pods running within a Kubernetes cluster. It is responsible for evaluating the security context and...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.