Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000233-CTR-000585

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes Kubelet must enable kernel protection.

    &lt;VulnDiscussion&gt;System kernel is responsible for memory, disk, and task management. The kernel provides a gateway between the system hardware...
    Rule High Severity
  • SRG-APP-000342-CTR-000775

    <GroupDescription></GroupDescription>
    Group
  • The Kubernetes API server must have the ValidatingAdmissionWebhook enabled.

    &lt;VulnDiscussion&gt;Enabling the admissions webhook allows for Kubernetes to apply policies against objects that are to be created, read, updated...
    Rule High Severity
  • SRG-APP-000342-CTR-000775

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes must have a pod security policy set.

    &lt;VulnDiscussion&gt;Enabling the admissions webhook allows for Kubernetes to apply policies against objects that are to be created, read, updated...
    Rule High Severity
  • SRG-APP-000435-CTR-001070

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes API Server must configure timeouts to limit attack surface.

    &lt;VulnDiscussion&gt;Kubernetes API Server request timeouts sets the duration a request stays open before timing out. Since the API Server is the ...
    Rule Medium Severity
  • SRG-APP-000454-CTR-001110

    <GroupDescription></GroupDescription>
    Group
  • Kubernetes must remove old components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of Kubernetes components that are not removed after updates have been installed may be exploited by adversa...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules