Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000219-CTR-000550

    Group
  • Kubernetes etcd must have the SSL Certificate Authority set.

    Kubernetes stores configuration and state information in a distributed key-value store called etcd. Anyone who can write to etcd can effectively control a Kubernetes cluster. Even just reading the ...
    Rule Medium Severity
  • SRG-APP-000219-CTR-000550

    Group
  • Kubernetes etcd must have a certificate for communication.

    Kubernetes stores configuration and state information in a distributed key-value store called etcd. Anyone who can write to etcd can effectively control the Kubernetes cluster. Even just reading th...
    Rule Medium Severity
  • SRG-APP-000219-CTR-000550

    Group
  • Kubernetes etcd must have a key file for secure communication.

    Kubernetes stores configuration and state information in a distributed key-value store called etcd. Anyone who can write to etcd can effectively control a Kubernetes cluster. Even just reading the ...
    Rule Medium Severity
  • SRG-APP-000219-CTR-000550

    Group
  • Kubernetes etcd must have peer-cert-file set for secure communication.

    Kubernetes stores configuration and state information in a distributed key-value store called etcd. Anyone who can write to etcd can effectively control the Kubernetes cluster. Even just reading th...
    Rule Medium Severity
  • SRG-APP-000219-CTR-000550

    Group
  • Kubernetes etcd must have a peer-key-file set for secure communication.

    Kubernetes stores configuration and state information in a distributed key-value store called etcd. Anyone who can write to etcd can effectively control a Kubernetes cluster. Even just reading the ...
    Rule Medium Severity
  • SRG-APP-000233-CTR-000585

    Group
  • Kubernetes Kubelet must enable kernel protection.

    System kernel is responsible for memory, disk, and task management. The kernel provides a gateway between the system hardware and software. Kubernetes requires kernel access to allocate resources t...
    Rule High Severity
  • SRG-APP-000342-CTR-000775

    Group
  • The Kubernetes API server must have the ValidatingAdmissionWebhook enabled.

    Enabling the admissions webhook allows for Kubernetes to apply policies against objects that are to be created, read, updated, or deleted. By applying a pod security policy, control can be given to...
    Rule High Severity
  • SRG-APP-000342-CTR-000775

    Group
  • Kubernetes must have a pod security policy set.

    Enabling the admissions webhook allows for Kubernetes to apply policies against objects that are to be created, read, updated, or deleted. By applying a pod security policy, control can be given to...
    Rule High Severity
  • SRG-APP-000435-CTR-001070

    Group
  • Kubernetes API Server must configure timeouts to limit attack surface.

    Kubernetes API Server request timeouts sets the duration a request stays open before timing out. Since the API Server is the central component in the Kubernetes Control Plane, it is vital to protec...
    Rule Medium Severity
  • SRG-APP-000454-CTR-001110

    Group
  • Kubernetes must remove old components after updated versions have been installed.

    Previous versions of Kubernetes components that are not removed after updates have been installed may be exploited by adversaries by allowing the vulnerabilities to still exist within the cluster. ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules