CIS Amazon Elastic Kubernetes Service Benchmark - Platform
Rules and Groups employed by this XCCDF Profile
-
OpenShift - Logging Settings
Contains evaluations for the cluster's logging configuration settings.Group -
Ensure Audit Logging is Enabled
The audit logs are part of the EKS managed Kubernetes control plane logs that are managed by Amazon EKS. Amazon EKS is integrated with AWS CloudTra...Rule Unknown Severity -
Kubernetes - Network Configuration and Firewalls
Most systems must be connected to a network of some sort, and this brings with it the substantial risk of network attack. This section discusses th...Group -
Ensure that application Namespaces have Network Policies defined.
Use network policies to isolate traffic in your cluster network.Rule High Severity -
Ensure Network Policy is Enabled
Use Network Policy to restrict pod to pod traffic within a cluster and segregate workloads.Rule Unknown Severity -
Encrypt Traffic to Load Balancers and Workloads
Encrypt traffic to HTTPS load balancers using TLS certificates.Rule Unknown Severity -
Restrict Access to the Control Plane Endpoint
Enable Endpoint Private Access to restrict access to the cluster's control plane to only an allowlist of authorized IPs.Rule Unknown Severity -
Ensure Private Endpoint Access
Disable access to the Kubernetes API from outside the node network if it is not required.Rule Unknown Severity -
Ensure Cluster Private Nodes
Disable public IP addresses for cluster nodes, so that they only have private IP addresses. Private Nodes are nodes with no public IP addresses.Rule Unknown Severity -
Kubernetes - Registry Security Practices
Contains evaluations for Kubernetes registry security practices, and cluster-wide registry configuration.Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules