I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000219-CTR-000550
<GroupDescription></GroupDescription>Group -
Kubernetes etcd must have the SSL Certificate Authority set.
<VulnDiscussion>Kubernetes stores configuration and state information in a distributed key-value store called etcd. Anyone who can write to e...Rule Medium Severity -
SRG-APP-000219-CTR-000550
<GroupDescription></GroupDescription>Group -
Kubernetes etcd must have a certificate for communication.
<VulnDiscussion>Kubernetes stores configuration and state information in a distributed key-value store called etcd. Anyone who can write to e...Rule Medium Severity -
SRG-APP-000219-CTR-000550
<GroupDescription></GroupDescription>Group -
Kubernetes etcd must have a key file for secure communication.
<VulnDiscussion>Kubernetes stores configuration and state information in a distributed key-value store called etcd. Anyone who can write to e...Rule Medium Severity -
SRG-APP-000219-CTR-000550
<GroupDescription></GroupDescription>Group -
Kubernetes etcd must have peer-cert-file set for secure communication.
<VulnDiscussion>Kubernetes stores configuration and state information in a distributed key-value store called etcd. Anyone who can write to e...Rule Medium Severity -
SRG-APP-000219-CTR-000550
<GroupDescription></GroupDescription>Group -
Kubernetes etcd must have a peer-key-file set for secure communication.
<VulnDiscussion>Kubernetes stores configuration and state information in a distributed key-value store called etcd. Anyone who can write to e...Rule Medium Severity -
SRG-APP-000233-CTR-000585
<GroupDescription></GroupDescription>Group -
Kubernetes Kubelet must enable kernel protection.
<VulnDiscussion>System kernel is responsible for memory, disk, and task management. The kernel provides a gateway between the system hardware...Rule High Severity -
SRG-APP-000342-CTR-000775
<GroupDescription></GroupDescription>Group -
The Kubernetes API server must have the ValidatingAdmissionWebhook enabled.
<VulnDiscussion>Enabling the admissions webhook allows for Kubernetes to apply policies against objects that are to be created, read, updated...Rule High Severity -
SRG-APP-000342-CTR-000775
<GroupDescription></GroupDescription>Group -
Kubernetes must have a pod security policy set.
<VulnDiscussion>Enabling the admissions webhook allows for Kubernetes to apply policies against objects that are to be created, read, updated...Rule High Severity -
SRG-APP-000435-CTR-001070
<GroupDescription></GroupDescription>Group -
Kubernetes API Server must configure timeouts to limit attack surface.
<VulnDiscussion>Kubernetes API Server request timeouts sets the duration a request stays open before timing out. Since the API Server is the ...Rule Medium Severity -
SRG-APP-000454-CTR-001110
<GroupDescription></GroupDescription>Group -
Kubernetes must remove old components after updated versions have been installed.
<VulnDiscussion>Previous versions of Kubernetes components that are not removed after updates have been installed may be exploited by adversa...Rule Medium Severity -
SRG-APP-000456-CTR-001125
<GroupDescription></GroupDescription>Group -
Kubernetes must contain the latest updates as authorized by IAVMs, CTOs, DTMs, and STIGs.
<VulnDiscussion>Kubernetes software must stay up to date with the latest patches, service packs, and hot fixes. Not updating the Kubernetes c...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes component manifests must be owned by root.
<VulnDiscussion>The Kubernetes manifests are those files that contain the arguments and settings for the Control Plane services. These servic...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes component etcd must be owned by etcd.
<VulnDiscussion>The Kubernetes etcd key-value store provides a way to store data to the Control Plane. If these files can be changed, data to...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes conf files must be owned by root.
<VulnDiscussion>The Kubernetes conf files contain the arguments and settings for the Control Plane services. These services are controller an...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes Kube Proxy kubeconfig must have file permissions set to 644 or more restrictive.
<VulnDiscussion>The Kubernetes Kube Proxy kubeconfig contain the argument and setting for the Control Planes. These settings contain network ...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes Kube Proxy kubeconfig must be owned by root.
<VulnDiscussion>The Kubernetes Kube Proxy kubeconfig contain the argument and setting for the Control Planes. These settings contain network ...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes Kubelet certificate authority file must have file permissions set to 644 or more restrictive.
<VulnDiscussion>The Kubernetes kubelet certificate authority file contains settings for the Kubernetes Node TLS certificate authority. Any re...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes Kubelet certificate authority must be owned by root.
<VulnDiscussion>The Kubernetes kube proxy kubeconfig contain the argument and setting for the Control Planes. These settings contain network ...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes component PKI must be owned by root.
<VulnDiscussion>The Kubernetes PKI directory contains all certificates (.crt files) supporting secure network communications in the Kubernete...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes kubelet KubeConfig must have file permissions set to 644 or more restrictive.
<VulnDiscussion>The Kubernetes kubelet agent registers nodes with the API Server, mounts volume storage for pods, and performs health checks ...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes kubelet KubeConfig file must be owned by root.
<VulnDiscussion>The Kubernetes kubelet agent registers nodes with the API server and performs health checks to containers within pods. If the...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes kubeadm.conf must be owned by root.
<VulnDiscussion>The Kubernetes kubeeadm.conf contains sensitive information regarding the cluster nodes configuration. If this file can be mo...Rule Medium Severity -
SRG-APP-000516-CTR-001325
<GroupDescription></GroupDescription>Group -
The Kubernetes kubeadm.conf must have file permissions set to 644 or more restrictive.
<VulnDiscussion>The Kubernetes kubeadm.conf contains sensitive information regarding the cluster nodes configuration. If this file can be mod...Rule Medium Severity -
SRG-APP-000516-CTR-001330
<GroupDescription></GroupDescription>Group -
The Kubernetes kubelet config must have file permissions set to 644 or more restrictive.
<VulnDiscussion>The Kubernetes kubelet agent registers nodes with the API server and performs health checks to containers within pods. If thi...Rule Medium Severity -
SRG-APP-000516-CTR-001330
<GroupDescription></GroupDescription>Group -
The Kubernetes kubelet config must be owned by root.
<VulnDiscussion>The Kubernetes kubelet agent registers nodes with the API Server and performs health checks to containers within pods. If thi...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.