I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000033-CTR-000095
Group -
The Kubernetes Kubelet must have the "readOnlyPort" flag disabled.
Kubelet serves a small REST API with read access to port 10255. The read-only port for Kubernetes provides no authentication or authorization security control. Providing unrestricted access on port...Rule High Severity -
SRG-APP-000033-CTR-000095
Group -
The Kubernetes API server must have the insecure bind address not set.
By default, the API server will listen on two ports and addresses. One address is the secure address and the other address is called the "insecure bind" address and is set by default to localhost. ...Rule High Severity -
SRG-APP-000033-CTR-000100
Group -
The Kubernetes API server must have the secure port set.
By default, the API server will listen on what is rightfully called the secure port, port 6443. Any requests to this port will perform authentication and authorization checks. If this port is disab...Rule Medium Severity -
SRG-APP-000033-CTR-000100
Group -
The Kubernetes API server must have anonymous authentication disabled.
The Kubernetes API Server controls Kubernetes via an API interface. A user who has access to the API essentially has root access to the entire Kubernetes cluster. To control access, users must be a...Rule High Severity -
SRG-APP-000033-CTR-000090
Group -
The Kubernetes Kubelet must have anonymous authentication disabled.
A user who has access to the Kubelet essentially has root access to the nodes contained within the Kubernetes Control Plane. To control access, users must be authenticated and authorized. By allowi...Rule High Severity -
SRG-APP-000033-CTR-000095
Group -
The Kubernetes kubelet must enable explicit authorization.
Kubelet is the primary agent on each node. The API server communicates with each kubelet to perform tasks such as starting/stopping pods. By default, kubelets allow all authenticated requests, even...Rule High Severity -
SRG-APP-000033-CTR-000095
Group -
Kubernetes Worker Nodes must not have sshd service running.
Worker Nodes are maintained and monitored by the Control Plane. Direct access and manipulation of the nodes should not take place by administrators. Worker nodes should be treated as immutable and ...Rule Medium Severity -
SRG-APP-000033-CTR-000095
Group -
Kubernetes Worker Nodes must not have the sshd service enabled.
Worker Nodes are maintained and monitored by the Control Plane. Direct access and manipulation of the nodes must not take place by administrators. Worker nodes must be treated as immutable and upda...Rule Medium Severity -
SRG-APP-000033-CTR-000095
Group -
Kubernetes dashboard must not be enabled.
While the Kubernetes dashboard is not inherently insecure on its own, it is often coupled with a misconfiguration of Role-Based Access control (RBAC) permissions that can unintentionally over-grant...Rule Medium Severity -
SRG-APP-000033-CTR-000090
Group -
Kubernetes Kubectl cp command must give expected access and results.
One of the tools heavily used to interact with containers in the Kubernetes cluster is kubectl. The command is the tool System Administrators used to create, modify, and delete resources. One of th...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.