Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000014-CTR-000035

    Group
  • The Kubernetes Scheduler must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination.

    The Kubernetes Scheduler will prohibit the use of SSL and unauthorized versions of TLS protocols to properly secure communication. The use of unsupported protocol exposes vulnerabilities to the Ku...
    Rule Medium Severity
  • SRG-APP-000014-CTR-000040

    Group
  • The Kubernetes API Server must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination.

    The Kubernetes API Server will prohibit the use of SSL and unauthorized versions of TLS protocols to properly secure communication. The use of unsupported protocol exposes vulnerabilities to the K...
    Rule Medium Severity
  • SRG-APP-000014-CTR-000035

    Group
  • The Kubernetes etcd must use TLS to protect the confidentiality of sensitive data during electronic dissemination.

    Kubernetes etcd will prohibit the use of SSL and unauthorized versions of TLS protocols to properly secure communication. The use of unsupported protocol exposes vulnerabilities to the Kubernetes ...
    Rule Medium Severity
  • SRG-APP-000014-CTR-000035

    Group
  • The Kubernetes etcd must use TLS to protect the confidentiality of sensitive data during electronic dissemination.

    The Kubernetes API Server will prohibit the use of SSL and unauthorized versions of TLS protocols to properly secure communication. The use of unsupported protocol exposes vulnerabilities to the K...
    Rule Medium Severity
  • SRG-APP-000023-CTR-000055

    Group
  • The Kubernetes Controller Manager must create unique service accounts for each work payload.

    The Kubernetes Controller Manager is a background process that embeds core control loops regulating cluster system state through the API Server. Every process executed in a pod has an associated se...
    Rule High Severity
  • SRG-APP-000033-CTR-000090

    Group
  • The Kubernetes API Server must enable Node,RBAC as the authorization mode.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD systems (e.g., networks, web servers, and web porta...
    Rule Medium Severity
  • SRG-APP-000038-CTR-000105

    Group
  • User-managed resources must be created in dedicated namespaces.

    Creating namespaces for user-managed resources is important when implementing Role-Based Access Controls (RBAC). RBAC allows for the authorization of users and helps support proper API server permi...
    Rule High Severity
  • SRG-APP-000033-CTR-000090

    Group
  • The Kubernetes Scheduler must have secure binding.

    Limiting the number of attack vectors and implementing authentication and encryption on the endpoints available to external sources is paramount when securing the overall Kubernetes cluster. The Sc...
    Rule Medium Severity
  • SRG-APP-000033-CTR-000090

    Group
  • The Kubernetes Controller Manager must have secure binding.

    Limiting the number of attack vectors and implementing authentication and encryption on the endpoints available to external sources is paramount when securing the overall Kubernetes cluster. The Co...
    Rule Medium Severity
  • SRG-APP-000033-CTR-000095

    Group
  • The Kubernetes API server must have the insecure port flag disabled.

    By default, the API server will listen on two ports. One port is the secure port and the other port is called the "localhost port". This port is also called the "insecure port", port 8080. Any requ...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules