Skip to content

CIS Amazon Elastic Kubernetes Service Benchmark - Platform

Rules and Groups employed by this XCCDF Profile

  • Kubernetes Settings

    Each section of this configuration guide includes information about the configuration of a Kubernetes cluster and a set of recommendations for hard...
    Group
  • Kubernetes - Account and Access Control

    In traditional Unix security, if an attacker gains shell access to a certain login account, they can perform any action or access any file to which...
    Group
  • Use Dedicated Service Accounts

    Kubernetes workloads should not use cluster node service accounts to authenticate to Amazon EKS APIs. Each Kubernetes workload that needs to authen...
    Rule Unknown Severity
  • Authentication

    In cloud workloads, there are many ways to create and configure to multiple authentication services. Some of these authentication methods by not be...
    Group
  • Manage Users with AWS IAM

    Amazon EKS uses IAM to provide authentication to your Kubernetes cluster through the AWS IAM Authenticator for Kubernetes. You can configure the st...
    Rule Unknown Severity
  • Kubernetes - General Security Practices

    Contains evaluations for general security practices for operating a Kubernetes environment.
    Group
  • Consider Fargate for Untrusted Workloads

    It is Best Practice to restrict or fence untrusted workloads when running in a multi-tenant environment.
    Rule Unknown Severity
  • Kubernetes Kubelet Settings

    The Kubernetes Kubelet is an agent that runs on each node in the cluster. It makes sure that containers are running in a pod. The kubelet takes a ...
    Group
  • kubelet - Configure the Client CA Certificate

    By default, the kubelet is not configured with a CA certificate which can subject the kubelet to man-in-the-middle attacks. To configure a client ...
    Rule Medium Severity
  • kubelet - Ensure that the --read-only-port is secured

    Disable the read-only port.
    Rule Medium Severity
  • OpenShift - Logging Settings

    Contains evaluations for the cluster's logging configuration settings.
    Group
  • Ensure Audit Logging is Enabled

    The audit logs are part of the EKS managed Kubernetes control plane logs that are managed by Amazon EKS. Amazon EKS is integrated with AWS CloudTra...
    Rule Unknown Severity
  • Kubernetes - Network Configuration and Firewalls

    Most systems must be connected to a network of some sort, and this brings with it the substantial risk of network attack. This section discusses th...
    Group
  • Ensure that application Namespaces have Network Policies defined.

    Use network policies to isolate traffic in your cluster network.
    Rule High Severity
  • Ensure Network Policy is Enabled

    Use Network Policy to restrict pod to pod traffic within a cluster and segregate workloads.
    Rule Unknown Severity
  • Encrypt Traffic to Load Balancers and Workloads

    Encrypt traffic to HTTPS load balancers using TLS certificates.
    Rule Unknown Severity
  • Restrict Access to the Control Plane Endpoint

    Enable Endpoint Private Access to restrict access to the cluster's control plane to only an allowlist of authorized IPs.
    Rule Unknown Severity
  • Ensure Private Endpoint Access

    Disable access to the Kubernetes API from outside the node network if it is not required.
    Rule Unknown Severity
  • Ensure Cluster Private Nodes

    Disable public IP addresses for cluster nodes, so that they only have private IP addresses. Private Nodes are nodes with no public IP addresses.
    Rule Unknown Severity
  • Kubernetes - Registry Security Practices

    Contains evaluations for Kubernetes registry security practices, and cluster-wide registry configuration.
    Group
  • Only use approved container registries

    Use approved container registries.
    Rule Unknown Severity
  • Ensure Image Vulnerability Scanning

    Scan images being deployed to Amazon EKS for vulnerabilities.
    Rule Unknown Severity
  • Ensure Cluster Service Account with read-only access to Amazon ECR

    Configure the Cluster Service Account with Storage Object Viewer Role to only allow read- only access to Amazon ECR.
    Rule Unknown Severity
  • Minimize user access to Amazon ECR

    Restrict user access to Amazon ECR, limiting interaction with build images to only authorized personnel and service accounts.
    Rule Unknown Severity
  • Kubernetes Secrets Management

    Secrets let you store and manage sensitive information, such as passwords, OAuth tokens, and ssh keys. Such information might otherwise be put in a...
    Group
  • Ensure Kubernetes Secrets are Encrypted

    Encrypt Kubernetes secrets, stored in etcd, using secrets encryption feature during Amazon EKS cluster creation.
    Rule Unknown Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules