Ensure that API server audit logging is enabled
An XCCDF Rule
Description
OpenShift has the ability to audit API server requests. Audit provides a security-relevant chronological set of records documenting the sequence of activities that have affected system by individual users, administrators, or other components of the system. Audit works at the API server level, logging all requests coming to the server. Verify that audit logging is enabled by checking that the API server audit log configuration is not set to `None`, which explicitly disables the functionality. For more information on how to configure the audit profile, please visit the documentation
warning alert: Warning
This rule's check operates on the cluster configuration dump.
Therefore, you need to use a tool that can query the OCP API, retrieve the
/apis/config.openshift.io/v1/apiservers/cluster
API endpoint to the local /apis/config.openshift.io/v1/apiservers/cluster
file. Rationale
Logging is an important detective control for all systems, to detect potential unauthorised access.
- ID
- xccdf_org.ssgproject.content_rule_audit_logging_enabled
- Severity
- Medium
- References
- Updated