Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • The Kubernetes PKI CRT must have file permissions set to 644 or more restrictive.

    The Kubernetes PKI directory contains all certificates (.crt files) supporting secure network communications in the Kubernetes Control Plane. If these files can be modified, data traversing within ...
    Rule Medium Severity
  • SRG-APP-000516-CTR-001335

    Group
  • The Kubernetes PKI keys must have file permissions set to 600 or more restrictive.

    The Kubernetes PKI directory contains all certificate key files supporting secure network communications in the Kubernetes Control Plane. If these files can be modified, data traversing within the ...
    Rule Medium Severity
  • SRG-APP-000190-CTR-000500

    Group
  • Kubernetes Kubelet must not disable timeouts.

    Idle connections from the Kubelet can be used by unauthorized users to perform malicious activity to the nodes, pods, containers, and cluster within the Kubernetes Control Plane. Setting the stream...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules