North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Node level
Rules and Groups employed by this XCCDF Profile
-
Verify Group Who Owns The OpenShift Admin Kubeconfig Files
To properly set the group owner of <code>/etc/kubernetes/static-pod-resources/kube-apiserver-certs/secrets/node-kubeconfigs/*.kubeconfig</code>, r...Rule Medium Severity -
Verify Group Who Owns The OpenShift Multus Container Network Interface Plugin Files
To properly set the group owner of <code>/var/run/multus/cni/net.d/*</code>, run the command: <pre>$ sudo chgrp root /var/run/multus/cni/net.d/*</...Rule Medium Severity -
Verify Group Who Owns The OpenShift PKI Certificate Files
To properly set the group owner of <code>/etc/kubernetes/static-pod-resources/*/*/*/tls.crt</code>, run the command: <pre>$ sudo chgrp root /etc/k...Rule Medium Severity -
Verify Group Who Owns The OpenShift PKI Private Key Files
To properly set the group owner of <code>/etc/kubernetes/static-pod-resources/*/*/*/*.key</code>, run the command: <pre>$ sudo chgrp root /etc/kub...Rule Medium Severity -
Verify Group Who Owns The OpenShift SDN CNI Server Config
To properly set the group owner of <code>/var/run/openshift-sdn/cniserver/config.json</code>, run the command: <pre>$ sudo chgrp root /var/run/ope...Rule Medium Severity -
Verify Group Who Owns The OVNKubernetes Socket
To properly set the group owner of <code>/run/ovn-kubernetes/cni/ovn-cni-server.sock</code>, run the command: <pre>$ sudo chgrp root /run/ovn-kube...Rule Medium Severity -
Verify Group Who Owns The OVNKubernetes DB files
To properly set the group owner of/var/lib/ovn/etc/*.db
, run the command:$ sudo chgrp root /var/lib/ovn/etc/*.db
Rule Medium Severity -
Verify Group Who Owns The Open vSwitch Configuration Database
Check if the group owner of <code>/etc/openvswitch/conf.db</code> is <code>hugetlbfs</code> on architectures other than s390x or <code>openvswitch<...Rule Medium Severity -
Verify Group Who Owns The Open vSwitch Configuration Database Lock
Check if the group owner of <code>/etc/openvswitch/conf.db.~lock~</code> is <code>hugetlbfs</code> on architectures other than s390x or <code>openv...Rule Medium Severity -
Verify Group Who Owns The Open vSwitch Process ID File
Ensure that the file <pre>/var/run/openvswitch/ovs-vswitchd.pid</pre>, is owned by the group <pre>openvswitch</pre> or <pre>hugetlbfs</pre>, depend...Rule Medium Severity -
Verify Group Who Owns The Open vSwitch Persistent System ID
Check if the group owner of <code>/etc/openvswitch/system-id.conf</code> is <code>hugetlbfs</code> on architectures other than s390x or <code>openv...Rule Medium Severity -
Verify Group Who Owns The Open vSwitch Daemon PID File
Ensure that the file <pre>/run/openvswitch/ovs-vswitchd.pid</pre>, is owned by the group <pre>openvswitch</pre> or <pre>hugetlbfs</pre>, depending ...Rule Medium Severity -
Verify Group Who Owns The Open vSwitch Database Server PID
Ensure that the file <pre>/run/openvswitch/ovsdb-server.pid</pre>, is owned by the group <pre>openvswitch</pre> or <pre>hugetlbfs</pre>, depending ...Rule Medium Severity -
Verify Group Who Owns The Kubernetes Scheduler Kubeconfig File
To properly set the group owner of <code>/etc/kubernetes/static-pod-resources/kube-scheduler-pod-*/configmaps/scheduler-kubeconfig/kubeconfig</cod...Rule Medium Severity -
Verify User Who Owns The OpenShift Container Network Interface Files
To properly set the owner of/etc/cni/net.d/*
, run the command:$ sudo chown root /etc/cni/net.d/*
Rule Medium Severity -
Verify User Who Owns The OpenShift Controller Manager Kubeconfig File
To properly set the owner of <code>/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-*/configmaps/controller-manager-kubeconfig/kub...Rule Medium Severity -
Verify User Who Owns The Etcd Database Directory
To properly set the owner of/var/lib/etcd/member/
, run the command:$ sudo chown root /var/lib/etcd/member/
Rule Medium Severity -
Verify User Who Owns The Etcd Write-Ahead-Log Files
To properly set the owner of/var/lib/etcd/member/wal/*
, run the command:$ sudo chown root /var/lib/etcd/member/wal/*
Rule Medium Severity -
Verify User Who Owns The Etcd Member Pod Specification File
To properly set the owner of <code>/etc/kubernetes/manifests/etcd-pod.yaml</code>, run the command: <pre>$ sudo chown root /etc/kubernetes/manifes...Rule Medium Severity -
Verify User Who Owns The Etcd PKI Certificate Files
To properly set the owner of <code>/etc/kubernetes/static-pod-resources/*/*/*/*.crt</code>, run the command: <pre>$ sudo chown root /etc/kubernete...Rule Medium Severity -
Verify User Who Owns The OpenShift SDN Container Network Interface Plugin IP Address Allocations
To properly set the owner of <code>/var/lib/cni/networks/openshift-sdn/.*</code>, run the command: <pre>$ sudo chown root /var/lib/cni/networks/op...Rule Medium Severity -
Verify User Who Owns The Kubernetes API Server Pod Specification File
To properly set the owner of <code>/etc/kubernetes/static-pod-resources/kube-apiserver-pod-*/kube-apiserver-pod.yaml</code>, run the command: <pre...Rule Medium Severity -
Verify User Who Owns The Kubernetes Controller Manager Pod Specification File
To properly set the owner of <code>/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-*/kube-controller-manager-pod.yaml</code>, run...Rule Medium Severity -
Verify User Who Owns The Kubernetes Scheduler Pod Specification File
To properly set the owner of <code>/etc/kubernetes/static-pod-resources/kube-scheduler-pod-*/kube-scheduler-pod.yaml</code>, run the command: <pre...Rule Medium Severity -
Verify User Who Owns The OpenShift Admin Kubeconfig Files
To properly set the owner of <code>/etc/kubernetes/static-pod-resources/kube-apiserver-certs/secrets/node-kubeconfigs/*.kubeconfig</code>, run the...Rule Medium Severity -
Verify User Who Owns The OpenShift Multus Container Network Interface Plugin Files
To properly set the owner of/var/run/multus/cni/net.d/*
, run the command:$ sudo chown root /var/run/multus/cni/net.d/*
Rule Medium Severity -
Verify User Who Owns The OpenShift PKI Certificate Files
To properly set the owner of <code>/etc/kubernetes/static-pod-resources/*/*/*/tls.crt</code>, run the command: <pre>$ sudo chown root /etc/kuberne...Rule Medium Severity -
Verify User Who Owns The OpenShift PKI Private Key Files
To properly set the owner of <code>/etc/kubernetes/static-pod-resources/*/*/*/*.key</code>, run the command: <pre>$ sudo chown root /etc/kubernete...Rule Medium Severity -
Verify User Who Owns The OpenShift SDN CNI Server Config
To properly set the owner of <code>/var/run/openshift-sdn/cniserver/config.json</code>, run the command: <pre>$ sudo chown root /var/run/openshift...Rule Medium Severity -
Verify User Who Owns The OVNKubernetes Socket
To properly set the owner of <code>/run/ovn-kubernetes/cni/ovn-cni-server.sock</code>, run the command: <pre>$ sudo chown root /run/ovn-kubernetes...Rule Medium Severity -
Verify Who Owns The OVNKubernetes DB files
To properly set the owner of/var/lib/ovn/etc/*.db
, run the command:$ sudo chown root /var/lib/ovn/etc/*.db
Rule Medium Severity -
Verify User Who Owns The Open vSwitch Configuration Database
To properly set the owner of/etc/openvswitch/conf.db
, run the command:$ sudo chown openvswitch /etc/openvswitch/conf.db
Rule Medium Severity -
Verify User Who Owns The Open vSwitch Configuration Database Lock
To properly set the owner of <code>/etc/openvswitch/.conf.db.~lock~</code>, run the command: <pre>$ sudo chown openvswitch /etc/openvswitch/.conf....Rule Medium Severity -
Verify User Who Owns The Open vSwitch Process ID File
To properly set the owner of <code>/var/run/openvswitch/ovs-vswitchd.pid</code>, run the command: <pre>$ sudo chown openvswitch /var/run/openvswit...Rule Medium Severity -
Verify User Who Owns The Open vSwitch Persistent System ID
To properly set the owner of <code>/etc/openvswitch/system-id.conf</code>, run the command: <pre>$ sudo chown openvswitch /etc/openvswitch/system-...Rule Medium Severity -
Verify User Who Owns The Open vSwitch Daemon PID File
To properly set the owner of <code>/run/openvswitch/ovs-vswitchd.pid</code>, run the command: <pre>$ sudo chown openvswitch /run/openvswitch/ovs-v...Rule Medium Severity -
Verify User Who Owns The Open vSwitch Database Server PID
To properly set the owner of <code>/run/openvswitch/ovsdb-server.pid</code>, run the command: <pre>$ sudo chown openvswitch /run/openvswitch/ovsdb...Rule Medium Severity -
Verify User Who Owns The Kubernetes Scheduler Kubeconfig File
To properly set the owner of <code>/etc/kubernetes/static-pod-resources/kube-scheduler-pod-*/configmaps/scheduler-kubeconfig/kubeconfig</code>, ru...Rule Medium Severity -
Verify Permissions on the OpenShift Container Network Interface Files
To properly set the permissions of/etc/cni/net.d/*
, run the command:$ sudo chmod 0600 /etc/cni/net.d/*
Rule Medium Severity -
Verify Permissions on the OpenShift Controller Manager Kubeconfig File
To properly set the permissions of <code>/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-*/configmaps/controller-manager-kubeconf...Rule Medium Severity -
Verify Permissions on the Etcd Database Directory
To properly set the permissions of/var/lib/etcd
, run the command:$ sudo chmod 0700 /var/lib/etcd
Rule Medium Severity -
Verify Permissions on the Etcd Write-Ahead-Log Files
To properly set the permissions of/var/lib/etcd/member/wal/*
, run the command:$ sudo chmod 0600 /var/lib/etcd/member/wal/*
Rule Medium Severity -
Verify Permissions on the Etcd Member Pod Specification File
To properly set the permissions of <code>/etc/kubernetes/manifests/etcd-pod.yaml</code>, run the command: <pre>$ sudo chmod 0600 /etc/kubernetes/m...Rule Medium Severity -
Verify Permissions on the Etcd PKI Certificate Files
To properly set the permissions of <code>/etc/kubernetes/static-pod-resources/etcd-*/secrets/*/*.crt</code>, run the command: <pre>$ sudo chmod 06...Rule Medium Severity -
Verify Permissions on the OpenShift SDN Container Network Interface Plugin IP Address Allocations
To properly set the permissions of <code>/var/lib/cni/networks/openshift-sdn/*</code>, run the command: <pre>$ sudo chmod 0644 /var/lib/cni/networ...Rule Medium Severity -
Verify Permissions on the Kubernetes API Server Pod Specification File
To properly set the permissions of <code>/etc/kubernetes/static-pod-resources/kube-apiserver-pod-*/kube-apiserver-pod.yaml</code>, run the command...Rule Medium Severity -
Verify Permissions on the Kubernetes Controller Manager Pod Specification File
To properly set the permissions of <code>/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-*/kube-controller-manager-pod.yaml</code...Rule Medium Severity -
Verify Permissions on the OpenShift Admin Kubeconfig Files
To properly set the permissions of <code>/etc/kubernetes/static-pod-resources/kube-apiserver-certs/secrets/node-kubeconfigs/*.kubeconfig</code>, r...Rule Medium Severity -
Verify Permissions on the OpenShift Multus Container Network Interface Plugin Files
To properly set the permissions of <code>/var/run/multus/cni/net.d/*</code>, run the command: <pre>$ sudo chmod 0644 /var/run/multus/cni/net.d/*</...Rule Medium Severity -
Verify Permissions on the OpenShift PKI Certificate Files
To properly set the permissions of <code>/etc/kubernetes/static-pod-resources/kube-*/secrets/*/tls.crt</code>, run the command: <pre>$ sudo chmod ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.