II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000033-CTR-000090
Group -
The Kubernetes API Server must enable Node,RBAC as the authorization mode.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD systems (e.g., networks, web servers, and web porta...Rule Medium Severity -
SRG-APP-000038-CTR-000105
Group -
User-managed resources must be created in dedicated namespaces.
Creating namespaces for user-managed resources is important when implementing Role-Based Access Controls (RBAC). RBAC allows for the authorization of users and helps support proper API server permi...Rule High Severity -
SRG-APP-000033-CTR-000090
Group -
The Kubernetes Scheduler must have secure binding.
Limiting the number of attack vectors and implementing authentication and encryption on the endpoints available to external sources is paramount when securing the overall Kubernetes cluster. The Sc...Rule Medium Severity -
SRG-APP-000033-CTR-000090
Group -
The Kubernetes Controller Manager must have secure binding.
Limiting the number of attack vectors and implementing authentication and encryption on the endpoints available to external sources is paramount when securing the overall Kubernetes cluster. The Co...Rule Medium Severity -
SRG-APP-000033-CTR-000095
Group -
The Kubernetes API server must have the insecure port flag disabled.
By default, the API server will listen on two ports. One port is the secure port and the other port is called the "localhost port". This port is also called the "insecure port", port 8080. Any requ...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules