II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516-CTR-001325
Group -
The Kubernetes kubelet KubeConfig file must be owned by root.
The Kubernetes kubelet agent registers nodes with the API server and performs health checks to containers within pods. If these files can be modified, the information system would be unaware of pod...Rule Medium Severity -
SRG-APP-000516-CTR-001325
Group -
The Kubernetes kubeadm.conf must be owned by root.
The Kubernetes kubeeadm.conf contains sensitive information regarding the cluster nodes configuration. If this file can be modified, the Kubernetes Platform Plane would be degraded or compromised f...Rule Medium Severity -
SRG-APP-000516-CTR-001325
Group -
The Kubernetes kubeadm.conf must have file permissions set to 644 or more restrictive.
The Kubernetes kubeadm.conf contains sensitive information regarding the cluster nodes configuration. If this file can be modified, the Kubernetes Platform Plane would be degraded or compromised fo...Rule Medium Severity -
SRG-APP-000516-CTR-001330
Group -
The Kubernetes kubelet config must have file permissions set to 644 or more restrictive.
The Kubernetes kubelet agent registers nodes with the API server and performs health checks to containers within pods. If this file can be modified, the information system would be unaware of pod o...Rule Medium Severity -
SRG-APP-000516-CTR-001330
Group -
The Kubernetes kubelet config must be owned by root.
The Kubernetes kubelet agent registers nodes with the API Server and performs health checks to containers within pods. If this file can be modified, the information system would be unaware of pod o...Rule Medium Severity -
SRG-APP-000516-CTR-001335
Group -
The Kubernetes etcd must have file permissions set to 644 or more restrictive.
The Kubernetes etcd key-value store provides a way to store data to the Control Plane. If these files can be changed, data to API object and Control Plane would be compromised.Rule Medium Severity -
SRG-APP-000516-CTR-001335
Group -
The Kubernetes admin kubeconfig must have file permissions set to 644 or more restrictive.
The Kubernetes admin kubeconfig files contain the arguments and settings for the Control Plane services. These services are controller and scheduler. If these files can be changed, the scheduler wi...Rule Medium Severity -
SRG-APP-000516-CTR-001335
Group -
Kubernetes API Server audit logs must be enabled.
Kubernetes API Server validates and configures pods and services for the API object. The REST operation provides frontend functionality to the cluster share state. Enabling audit logs provides a wa...Rule Medium Severity -
SRG-APP-000516-CTR-001335
Group -
The Kubernetes API Server must be set to audit log max size.
The Kubernetes API Server must be set for enough storage to retain log information over the period required. When audit logs are large in size, the monitoring service for events becomes degraded. T...Rule Medium Severity -
SRG-APP-000516-CTR-001335
Group -
The Kubernetes API Server must be set to audit log maximum backup.
The Kubernetes API Server must set enough storage to retain logs for monitoring suspicious activity and system misconfiguration, and provide evidence for Cyber Security Investigations.Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.