CIS Kubernetes 1.7.0 Benchmark v1.1.0 L1

Audit Details

Name: CIS Kubernetes 1.7.0 Benchmark v1.1.0 L1

Updated: 6/17/2024

Authority: CIS

Plugin: Unix

Revision: 1.17

Estimated Item Count: 117

File Details

Filename: CIS_Kubernetes_v1.1.0_Level_1.audit

Size: 201 kB

MD5: 0f0986ffa8796d1638dd208e056c0329
SHA256: 0e54b1e1cb37ab250a1d6a423e6249e0707fd421d9107f349b92fd078f368c6a

Audit Items

DescriptionCategories
1.1.1 Ensure that the --allow-privileged argument is set to false

ACCESS CONTROL

1.1.2 Ensure that the --anonymous-auth argument is set to false

IDENTIFICATION AND AUTHENTICATION

1.1.3 Ensure that the --basic-auth-file argument is not set

IDENTIFICATION AND AUTHENTICATION

1.1.4 Ensure that the --insecure-allow-any-token argument is not set

IDENTIFICATION AND AUTHENTICATION

1.1.5 Ensure that the --kubelet-https argument is set to true

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.6 Ensure that the --insecure-bind-address argument is not set

CONFIGURATION MANAGEMENT

1.1.7 Ensure that the --insecure-port argument is set to 0

CONFIGURATION MANAGEMENT

1.1.8 Ensure that the --secure-port argument is not set to 0

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.9 Ensure that the --profiling argument is set to false

CONFIGURATION MANAGEMENT

1.1.10 Ensure that the --repair-malformed-updates argument is set to false

CONFIGURATION MANAGEMENT

1.1.11 Ensure that the admission control policy is not set to AlwaysAdmit

ACCESS CONTROL

1.1.12 Ensure that the admission control policy is set to AlwaysPullImages

ACCESS CONTROL

1.1.13 Ensure that the admission control policy is set to DenyEscalatingExec

ACCESS CONTROL

1.1.14 Ensure that the admission control policy is set to SecurityContextDeny

ACCESS CONTROL

1.1.15 Ensure that the admission control policy is set to NamespaceLifecycle

ACCESS CONTROL

1.1.16 Ensure that the --audit-log-path argument is set as appropriate

AUDIT AND ACCOUNTABILITY

1.1.17 Ensure that the --audit-log-maxage argument is set to 30 or as appropriate

AUDIT AND ACCOUNTABILITY

1.1.18 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate

AUDIT AND ACCOUNTABILITY

1.1.19 Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate

AUDIT AND ACCOUNTABILITY

1.1.20 Ensure that the --authorization-mode argument is not set to AlwaysAllow

ACCESS CONTROL

1.1.21 Ensure that the --token-auth-file parameter is not set

IDENTIFICATION AND AUTHENTICATION

1.1.22 Ensure that the --kubelet-certificate-authority argument is set as appropriate

IDENTIFICATION AND AUTHENTICATION

1.1.23 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - kubelet-client-certificate

IDENTIFICATION AND AUTHENTICATION

1.1.23 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - kubelet-client-key

IDENTIFICATION AND AUTHENTICATION

1.1.24 Ensure that the --service-account-lookup argument is set to true

IDENTIFICATION AND AUTHENTICATION

1.1.25 Ensure that the admission control policy is set to PodSecurityPolicy

ACCESS CONTROL

1.1.26 Ensure that the --service-account-key-file argument is set as appropriate

IDENTIFICATION AND AUTHENTICATION

1.1.27 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate - etcd-certfile

IDENTIFICATION AND AUTHENTICATION

1.1.27 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate - etcd-keyfile

IDENTIFICATION AND AUTHENTICATION

1.1.28 Ensure that the admission control policy is set to ServiceAccount

ACCESS CONTROL

1.1.29 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - tls-cert-file

IDENTIFICATION AND AUTHENTICATION

1.1.29 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - tls-private-key-file

IDENTIFICATION AND AUTHENTICATION

1.1.30 Ensure that the --client-ca-file argument is set as appropriate

IDENTIFICATION AND AUTHENTICATION

1.1.31 Ensure that the --etcd-cafile argument is set as appropriate

IDENTIFICATION AND AUTHENTICATION

1.1.32 Ensure that the --authorization-mode argument is set to Node

ACCESS CONTROL

1.1.33 Ensure that the admission control policy is set to NodeRestriction

ACCESS CONTROL

1.1.34 Ensure that the --experimental-encryption-provider-config argument is set as appropriate
1.1.35 Ensure that the encryption provider is set to aescbc
1.2.1 Ensure that the --profiling argument is set to false

CONFIGURATION MANAGEMENT

1.3.1 Ensure that the --terminated-pod-gc-threshold argument is set as appropriate

CONFIGURATION MANAGEMENT

1.3.2 Ensure that the --profiling argument is set to false

CONFIGURATION MANAGEMENT

1.3.3 Ensure that the --use-service-account-credentials argument is set to true

ACCESS CONTROL

1.3.4 Ensure that the --service-account-private-key-file argument is set as appropriate

IDENTIFICATION AND AUTHENTICATION

1.3.5 Ensure that the --root-ca-file argument is set as appropriate

IDENTIFICATION AND AUTHENTICATION

1.3.7 Ensure that the RotateKubeletServerCertificate argument is set to true

IDENTIFICATION AND AUTHENTICATION

1.4.1 Ensure that the apiserver file permissions are set to 644 or more restrictive

CONFIGURATION MANAGEMENT

1.4.2 Ensure that the apiserver file ownership is set to root:root

CONFIGURATION MANAGEMENT

1.4.3 Ensure that the config file permissions are set to 644 or more restrictive

CONFIGURATION MANAGEMENT

1.4.4 Ensure that the config file ownership is set to root:root

CONFIGURATION MANAGEMENT

1.4.5 Ensure that the scheduler file permissions are set to 644 or more restrictive

CONFIGURATION MANAGEMENT