Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-CTR-001335

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes etcd must have file permissions set to 644 or more restrictive.

    &lt;VulnDiscussion&gt;The Kubernetes etcd key-value store provides a way to store data to the Control Plane. If these files can be changed, data to...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001335

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes admin kubeconfig must have file permissions set to 644 or more restrictive.

    &lt;VulnDiscussion&gt;The Kubernetes admin kubeconfig files contain the arguments and settings for the Control Plane services. These services are c...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001335

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes API Server audit logs must be enabled.

    &lt;VulnDiscussion&gt;Kubernetes API Server validates and configures pods and services for the API object. The REST operation provides frontend fun...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001335

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes API Server must be set to audit log max size.

    &lt;VulnDiscussion&gt;The Kubernetes API Server must be set for enough storage to retain log information over the period required. When audit logs ...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001335

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes API Server must be set to audit log maximum backup.

    &lt;VulnDiscussion&gt;The Kubernetes API Server must set enough storage to retain logs for monitoring suspicious activity and system misconfigurati...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001335

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes API Server audit log retention must be set.

    &lt;VulnDiscussion&gt;The Kubernetes API Server must set enough storage to retain logs for monitoring suspicious activity and system misconfigurati...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001335

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes API Server audit log path must be set.

    &lt;VulnDiscussion&gt;Kubernetes API Server validates and configures pods and services for the API object. The REST operation provides frontend fun...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001335

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes PKI CRT must have file permissions set to 644 or more restrictive.

    &lt;VulnDiscussion&gt;The Kubernetes PKI directory contains all certificates (.crt files) supporting secure network communications in the Kubernete...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001335

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes PKI keys must have file permissions set to 600 or more restrictive.

    &lt;VulnDiscussion&gt;The Kubernetes PKI directory contains all certificate key files supporting secure network communications in the Kubernetes Co...
    Rule Medium Severity
  • SRG-APP-000190-CTR-000500

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes Kubelet must not disable timeouts.

    &lt;VulnDiscussion&gt;Idle connections from the Kubelet can be used by unauthorized users to perform malicious activity to the nodes, pods, contain...
    Rule Medium Severity
  • SRG-APP-000439-CTR-001080

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes API Server must disable basic authentication to protect information in transit.

    &lt;VulnDiscussion&gt;Kubernetes basic authentication sends and receives request containing username, uid, groups, and other fields over a clear te...
    Rule High Severity
  • SRG-APP-000439-CTR-001080

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes API Server must disable token authentication to protect information in transit.

    &lt;VulnDiscussion&gt;Kubernetes token authentication uses password known as secrets in a plaintext file. This file contains sensitive information ...
    Rule High Severity
  • SRG-APP-000439-CTR-001080

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes endpoints must use approved organizational certificate and key pair to protect information in transit.

    &lt;VulnDiscussion&gt;Kubernetes control plane and external communication is managed by API Server. The main implementation of the API Server is to...
    Rule High Severity
  • SRG-APP-000342-CTR-000775

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes must have a Pod Security Admission control file configured.

    &lt;VulnDiscussion&gt;An admission controller intercepts and processes requests to the Kubernetes API prior to persistence of the object, but after...
    Rule High Severity
  • SRG-APP-000342-CTR-000775

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes must enable PodSecurity admission controller on static pods and Kubelets.

    &lt;VulnDiscussion&gt;PodSecurity admission controller is a component that validates and enforces security policies for pods running within a Kuber...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules