CIS Kubernetes Benchmark v1.6.1 L1 Worker

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Kubernetes Benchmark v1.6.1 L1 Worker

Updated: 7/13/2023

Authority: CIS

Plugin: Unix

Revision: 1.8

Estimated Item Count: 26

Audit Items

DescriptionCategories
4.1.1 Ensure that the kubelet service file permissions are set to 644 or more restrictive
4.1.2 Ensure that the kubelet service file ownership is set to root:root
4.1.3 If proxy kubeconfig file exists ensure permissions are set to 644 or more restrictive
4.1.4 If proxy kubeconfig file exists ensure ownership is set to root:root
4.1.5 Ensure that the --kubeconfig kubelet.conf file permissions are set to 644 or more restrictive
4.1.6 Ensure that the --kubeconfig kubelet.conf file ownership is set to root:root
4.1.7 Ensure that the certificate authorities file permissions are set to 644 or more restrictive
4.1.8 Ensure that the client certificate authorities file ownership is set to root:root
4.1.9 Ensure that the kubelet --config configuration file has permissions set to 644 or more restrictive
4.1.10 Ensure that the kubelet --config configuration file ownership is set to root:root
4.2.1 Ensure that the --anonymous-auth argument is set to false
4.2.2 Ensure that the --authorization-mode argument is not set to AlwaysAllow
4.2.3 Ensure that the --client-ca-file argument is set as appropriate
4.2.4 Verify that the --read-only-port argument is set to 0
4.2.5 Ensure that the --streaming-connection-idle-timeout argument is not set to 0
4.2.6 Ensure that the --protect-kernel-defaults argument is set to true
4.2.7 Ensure that the --make-iptables-util-chains argument is set to true
4.2.8 Ensure that the --hostname-override argument is not set
4.2.10 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - cert
4.2.10 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - key
4.2.11 Ensure that the --rotate-certificates argument is not set to false
4.2.12 Verify that the RotateKubeletServerCertificate argument is set to true
4.2.13 Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers
5.1.3 Minimize wildcard use in Roles and ClusterRoles - clusterroles
5.1.3 Minimize wildcard use in Roles and ClusterRoles - roles
CIS_Kubernetes_v1.6.1_Level_1_Worker.audit from CIS Kubernetes Benchmark v1.6.1