Skip to content

North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Node level

Rules and Groups employed by this XCCDF Profile

  • OpenShift Audit Logs Must Have Mode 0600

    To properly set the permissions of <code>/var/log/openshift-apiserver/.*</code>, run the command: <pre>$ sudo chmod 0600 /var/log/openshift-apiser...
    Rule Medium Severity
  • Ensure /var/log/kube-apiserver Located On Separate Partition

    Kubernetes API server audit logs are stored in the <code>/var/log/kube-apiserver</code> directory. <p> Partitioning Red Hat CoreOS is a Day 1 opera...
    Rule Medium Severity
  • Ensure /var/log/oauth-apiserver Located On Separate Partition

    OpenShift OAuth server audit logs are stored in the <code>/var/log/oauth-apiserver</code> directory. <p> Partitioning Red Hat CoreOS is a Day 1 ope...
    Rule Medium Severity
  • Ensure /var/log/openshift-apiserver Located On Separate Partition

    Openshift API server audit logs are stored in the <code>/var/log/openshift-apiserver</code> directory. <p> Partitioning Red Hat CoreOS is a Day 1 o...
    Rule Medium Severity
  • OpenShift - Master Node Settings

    Contains evaluations for the master node configuration settings.
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules