Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000456-CTR-001125

    Group
  • Kubernetes must contain the latest updates as authorized by IAVMs, CTOs, DTMs, and STIGs.

    Kubernetes software must stay up to date with the latest patches, service packs, and hot fixes. Not updating the Kubernetes control plane will expose the organization to vulnerabilities. Flaws dis...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001325

    Group
  • The Kubernetes component manifests must be owned by root.

    The Kubernetes manifests are those files that contain the arguments and settings for the Control Plane services. These services are etcd, the api server, controller, proxy, and scheduler. If these ...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001325

    Group
  • The Kubernetes component etcd must be owned by etcd.

    The Kubernetes etcd key-value store provides a way to store data to the Control Plane. If these files can be changed, data to API object and the Control Plane would be compromised. The scheduler wi...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001325

    Group
  • The Kubernetes conf files must be owned by root.

    The Kubernetes conf files contain the arguments and settings for the Control Plane services. These services are controller and scheduler. If these files can be changed, the scheduler will be implem...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001325

    Group
  • The Kubernetes Kube Proxy kubeconfig must have file permissions set to 644 or more restrictive.

    The Kubernetes Kube Proxy kubeconfig contain the argument and setting for the Control Planes. These settings contain network rules for restricting network communication between pods, clusters, and ...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001325

    Group
  • The Kubernetes Kube Proxy kubeconfig must be owned by root.

    The Kubernetes Kube Proxy kubeconfig contain the argument and setting for the Control Planes. These settings contain network rules for restricting network communication between pods, clusters, and ...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001325

    Group
  • The Kubernetes Kubelet certificate authority file must have file permissions set to 644 or more restrictive.

    The Kubernetes kubelet certificate authority file contains settings for the Kubernetes Node TLS certificate authority. Any request presenting a client certificate signed by one of the authorities i...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001325

    Group
  • The Kubernetes Kubelet certificate authority must be owned by root.

    The Kubernetes kube proxy kubeconfig contain the argument and setting for the Control Planes. These settings contain network rules for restricting network communication between pods, clusters, and ...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001325

    Group
  • The Kubernetes component PKI must be owned by root.

    The Kubernetes PKI directory contains all certificates (.crt files) supporting secure network communications in the Kubernetes Control Plane. If these files can be modified, data traversing within ...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001325

    Group
  • The Kubernetes kubelet KubeConfig must have file permissions set to 644 or more restrictive.

    The Kubernetes kubelet agent registers nodes with the API Server, mounts volume storage for pods, and performs health checks to containers within pods. If these files can be modified, the informati...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules