CIS Google Kubernetes Engine GKE Autopilot v1.3.0 L2

Audit Details

Name: CIS Google Kubernetes Engine GKE Autopilot v1.3.0 L2

Updated: 3/13/2026

Authority: CIS

Plugin: GCP

Revision: 1.0

Estimated Item Count: 20

File Details

Filename: CIS_Google_Kubernetes_Engine_GKE_Autopilot_v1.3.0_L2.audit

Size: 70.9 kB

MD5: 689b59420eb146c5c7b97530dec03300
SHA256: a50bcf8d26584a434258aa1c56de77dfbeef6e62bff49663c609dc29a008e4b8

Audit Items

DescriptionCategories
4.1.8 Avoid bindings to system:anonymous

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

4.3.1 Ensure that all Namespaces have Network Policies defined

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4.1 Consider external secret storage

SYSTEM AND COMMUNICATIONS PROTECTION

4.5.1 Configure Image Provenance using ImagePolicyWebhook admission controller

CONFIGURATION MANAGEMENT, MAINTENANCE

4.6.2 Ensure that the seccomp profile is set to RuntimeDefault in the pod definitions

CONFIGURATION MANAGEMENT

4.6.3 Apply Security Context to Pods and Containers

CONFIGURATION MANAGEMENT

4.6.4 The default namespace should not be used

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.1 Ensure Image Vulnerability Scanning is enabled

RISK ASSESSMENT

5.1.2 Minimize user access to Container Image repositories

ACCESS CONTROL, MEDIA PROTECTION

5.1.3 Minimize cluster access to read-only for Container Image repositories

ACCESS CONTROL, MEDIA PROTECTION

5.1.4 Ensure only trusted container images are used

CONFIGURATION MANAGEMENT

5.2.1 Ensure GKE clusters are not running using the Compute Engine default service account

IDENTIFICATION AND AUTHENTICATION

5.3.1 Ensure Kubernetes Secrets are encrypted using keys managed in Cloud KMS

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.2 Ensure Control Plane Authorized Networks is Enabled

ACCESS CONTROL, MEDIA PROTECTION

5.4.3 Ensure clusters are created with Private Endpoint Enabled and Public Access Disabled

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.4 Ensure clusters are created with Private Nodes

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.5 Ensure use of Google-managed SSL Certificates

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.5.1 Manage Kubernetes RBAC users with Google Groups for GKE

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.6.1 Enable Customer-Managed Encryption Keys (CMEK) for GKE Persistent Disks (PD)

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.7.1 Enable Security Posture

CONFIGURATION MANAGEMENT