NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level
Rules and Groups employed by this XCCDF Profile
-
Verify Permissions on the OpenShift PKI Private Key Files
To properly set the permissions of <code>/etc/kubernetes/static-pod-resources/*/*/*/*.key</code>, run the command: <pre>$ sudo chmod 0600 /etc/kub...Rule Medium Severity -
Verify Permissions on the OVNKubernetes socket
To properly set the permissions of <code>/run/ovn-kubernetes/cni/ovn-cni-server.sock</code>, run the command: <pre>$ sudo chmod 0600 /run/ovn-kube...Rule Medium Severity -
Verify Permissions on the OVNKubernetes DB files
To properly set the permissions of/var/lib/ovn/etc/*.db
, run the command:$ sudo chmod 0640 /var/lib/ovn/etc/*.db
Rule Medium Severity -
Verify Permissions on the Open vSwitch Configuration Database
To properly set the permissions of/etc/openvswitch/conf.db
, run the command:$ sudo chmod 0640 /etc/openvswitch/conf.db
Rule Medium Severity -
Verify Permissions on the Open vSwitch Configuration Database Lock
To properly set the permissions of <code>/etc/openvswitch/.conf.db.~lock~</code>, run the command: <pre>$ sudo chmod 0600 /etc/openvswitch/.conf.d...Rule Medium Severity -
Verify Permissions on the Open vSwitch Process ID File
To properly set the permissions of <code>/var/run/openvswitch/ovs-vswitchd.pid</code>, run the command: <pre>$ sudo chmod 0644 /var/run/openvswitc...Rule Medium Severity -
Verify Permissions on the Open vSwitch Persistent System ID
To properly set the permissions of <code>/etc/openvswitch/system-id.conf</code>, run the command: <pre>$ sudo chmod 0644 /etc/openvswitch/system-i...Rule Medium Severity -
Verify Permissions on the Open vSwitch Daemon PID File
To properly set the permissions of <code>/run/openvswitch/ovs-vswitchd.pid</code>, run the command: <pre>$ sudo chmod 0644 /run/openvswitch/ovs-vs...Rule Medium Severity -
Verify Permissions on the Open vSwitch Database Server PID
To properly set the permissions of <code>/run/openvswitch/ovsdb-server.pid</code>, run the command: <pre>$ sudo chmod 0644 /run/openvswitch/ovsdb-...Rule Medium Severity -
Verify Permissions on the Kubernetes Scheduler Pod Specification File
To properly set the permissions of <code>/etc/kubernetes/static-pod-resources/kube-scheduler-pod-*/kube-scheduler-pod.yaml</code>, run the command...Rule Medium Severity -
Verify Permissions on the Kubernetes Scheduler Kubeconfig File
To properly set the permissions of <code>/etc/kubernetes/static-pod-resources/kube-scheduler-pod-*/configmaps/scheduler-kubeconfig/kubeconfig</cod...Rule Medium Severity -
Verify Permissions on the OpenShift SDN CNI Server Config
To properly set the permissions of <code>/var/run/openshift-sdn/cniserver/config.json</code>, run the command: <pre>$ sudo chmod 0444 /var/run/ope...Rule Medium Severity -
Kubernetes - Worker Node Settings
Contains evaluations for the worker node configuration settings.Group -
Verify Group Who Owns The Kubelet Configuration File
To properly set the group owner of <code>/etc/kubernetes/kubelet.conf</code>, run the command: <pre>$ sudo chgrp root /etc/kubernetes/kubelet.conf...Rule Medium Severity -
Verify Group Who Owns the Worker Certificate Authority File
To properly set the group owner of <code>/etc/kubernetes/kubelet-ca.crt</code>, run the command: <pre>$ sudo chgrp root /etc/kubernetes/kubelet-ca...Rule Medium Severity -
Verify Group Who Owns The Worker Kubeconfig File
To properly set the group owner of <code>/var/lib/kubelet/kubeconfig</code>, run the command: <pre>$ sudo chgrp root /var/lib/kubelet/kubeconfig</...Rule Medium Severity -
Verify Group Who Owns The OpenShift Node Service File
' To properly set the group owner of <code>/etc/systemd/system/kubelet.service</code>, run the command: <pre>$ sudo chgrp root /etc/systemd/sys...Rule Medium Severity -
Verify User Who Owns The Kubelet Configuration File
To properly set the owner of/var/lib/kubelet/config.json
, run the command:$ sudo chown root /var/lib/kubelet/config.json
Rule Medium Severity -
Verify User Who Owns The Kubelet Configuration File
To properly set the owner of/etc/kubernetes/kubelet.conf
, run the command:$ sudo chown root /etc/kubernetes/kubelet.conf
Rule Medium Severity -
Verify User Who Owns the Worker Certificate Authority File
To properly set the owner of <code>/etc/kubernetes/kubelet-ca.crt</code>, run the command: <pre>$ sudo chown root /etc/kubernetes/kubelet-ca.crt <...Rule Medium Severity -
Verify User Who Owns The Worker Kubeconfig File
To properly set the owner of/var/lib/kubelet/kubeconfig
, run the command:$ sudo chown root /var/lib/kubelet/kubeconfig
Rule Medium Severity -
Verify User Who Owns The OpenShift Node Service File
' To properly set the owner of <code>/etc/systemd/system/kubelet.service</code>, run the command: <pre>$ sudo chown root /etc/systemd/system/ku...Rule Medium Severity -
Verify Permissions on The Kubelet Configuration File
To properly set the permissions of <code>/var/lib/kubelet/config.json</code>, run the command: <pre>$ sudo chmod 0600 /var/lib/kubelet/config.json...Rule Medium Severity -
Verify Permissions on The Kubelet Configuration File
To properly set the permissions of <code>/etc/kubernetes/kubelet.conf</code>, run the command: <pre>$ sudo chmod 0644 /etc/kubernetes/kubelet.conf...Rule Medium Severity -
Verify Permissions on the Worker Certificate Authority File
To properly set the permissions of <code>/etc/kubernetes/kubelet-ca.crt</code>, run the command: <pre>$ sudo chmod 0644 /etc/kubernetes/kubelet-ca...Rule Medium Severity -
Verify Permissions on the Worker Kubeconfig File
To properly set the permissions of <code>/var/lib/kubelet/kubeconfig</code>, run the command: <pre>$ sudo chmod 0600 /var/lib/kubelet/kubeconfig</...Rule Medium Severity -
Verify Permissions on the OpenShift Node Service File
To properly set the permissions of <code>/etc/systemd/system/kubelet.service</code>, run the command: <pre>$ sudo chmod 0644 /etc/systemd/system/k...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.