CIS Google Kubernetes Engine GKE v1.9.0 L1 GCP

Audit Details

Name: CIS Google Kubernetes Engine GKE v1.9.0 L1 GCP

Updated: 3/6/2026

Authority: CIS

Plugin: GCP

Revision: 1.0

Estimated Item Count: 24

File Details

Filename: CIS_Google_Kubernetes_Engine_GKE_v1.9.0_L1_GCP.audit

Size: 74.4 kB

MD5: 812901da72173cb3e3aa4966de7db722
SHA256: 8ceddf97f872930a52d6fe4e904afdf5fcaf472de3077669b0dc05f276f2ca95

Audit Items

DescriptionCategories
4.1.1 Ensure that the cluster-admin role is only used where required

ACCESS CONTROL

4.1.2 Minimize access to secrets

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.1.3 Minimize wildcard use in Roles and ClusterRoles

IDENTIFICATION AND AUTHENTICATION

4.1.4 Ensure that default service accounts are not actively used

ACCESS CONTROL

4.1.5 Ensure that Service Account Tokens are only mounted where necessary

CONFIGURATION MANAGEMENT

4.1.6 Avoid use of system:masters group

ACCESS CONTROL

4.1.7 Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes cluster

ACCESS CONTROL

4.1.9 Avoid non-default bindings to system:unauthenticated

ACCESS CONTROL

4.1.10 Avoid non-default bindings to system:authenticated

ACCESS CONTROL

4.2.1 Ensure that the cluster enforces Pod Security Standard Baseline profile or stricter for all namespaces.

CONFIGURATION MANAGEMENT

4.3.1 Ensure that the CNI in use supports Network Policies

CONFIGURATION MANAGEMENT

4.6.1 Create administrative boundaries between resources using namespaces

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.1 Ensure GKE clusters are not running using the Compute Engine default service account

IDENTIFICATION AND AUTHENTICATION

5.5.1 Ensure Container-Optimized OS (cos_containerd) is used for GKE Node images

CONFIGURATION MANAGEMENT

5.5.4 When creating New Clusters - Automate GKE version management using Release Channels

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

5.5.5 Ensure Shielded GKE Nodes are Enabled

CONFIGURATION MANAGEMENT

5.5.6 Ensure Integrity Monitoring for Shielded GKE Nodes is Enabled

RISK ASSESSMENT

5.6.2 Ensure use of VPC-native clusters

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.6.5 Ensure clusters are created with Private Nodes

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.7.1 Ensure Logging and Cloud Monitoring is Enabled

AUDIT AND ACCOUNTABILITY

5.8.1 Ensure authentication using Client Certificates is Disabled

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.8.3 Ensure Legacy Authorization (ABAC) is Disabled

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.10.1 Ensure Kubernetes Web UI is Disabled

CONFIGURATION MANAGEMENT

5.10.2 Ensure that Alpha clusters are not used for production workloads

SYSTEM AND COMMUNICATIONS PROTECTION