• Tenable
  • Audits
  • Settings
    Links
    Tenable Cloud Tenable Community & Support Tenable University
    Theme
  • Tenable
  • Plugins
  • Overview
  • Plugins Pipeline
  • Newest
  • Updated
  • Search
  • Nessus Families
  • WAS Families
  • NNM Families
  • LCE Families
  • Tenable OT Security Families
  • About Plugin Families
  • Release Notes
  • Audits
  • Overview
  • Newest
  • Updated
  • Search Audit Files
  • Search Items
  • References
  • Authorities
  • Documentation
  • Download All Audit Files
  • Indicators
  • Overview
  • Search
  • Indicators of Attack
  • Indicators of Exposure
  • CVEs
  • Overview
  • Newest
  • Updated
  • Search
  • Attack Path Techniques
  • Overview
  • Search
    • Links
    • Tenable Cloud
    • Tenable Community & Support
    • Tenable University
    • Settings
    • Theme
Detections
  • Plugins
  • Overview
  • Plugins Pipeline
  • Release Notes
  • Newest
  • Updated
  • Search
  • Nessus Families
  • WAS Families
  • NNM Families
  • LCE Families
  • Tenable OT Security Families
  • About Plugin Families
  • Audits
  • Overview
  • Newest
  • Updated
  • Search Audit Files
  • Search Items
  • References
  • Authorities
  • Documentation
  • Download All Audit Files
  • Indicators
  • Overview
  • Search
  • Indicators of Attack
  • Indicators of Exposure
Analytics
  • CVEs
  • Overview
  • Newest
  • Updated
  • Search
  • Attack Path Techniques
  • Overview
  • Search
  1. Audits
  2. CIS Kubernetes Benchmark v1.7.1 L2 Master
  1. Audits

CIS Kubernetes Benchmark v1.7.1 L2 Master

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Kubernetes Benchmark v1.7.1 L2 Master

Updated: 2/5/2024

Authority: CIS

Plugin: Unix

Revision: 1.1

Estimated Item Count: 13

Audit Items

  • Items
  • Changelog
DescriptionCategories
1.3.6 Ensure that the RotateKubeletServerCertificate argument is set to true
2.7 Ensure that a unique Certificate Authority is used for etcd
3.2.2 Ensure that the audit policy covers key security concerns
5.2.7 Minimize the admission of root containers
5.2.10 Minimize the admission of containers with capabilities assigned
5.3.2 Ensure that all Namespaces have Network Policies defined
5.4.1 Prefer using secrets as files over secrets as environment variables
5.4.2 Consider external secret storage
5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controller
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
5.7.3 Apply Security Context to Your Pods and Containers
5.7.4 The default namespace should not be used
CIS_Kubernetes_v1.7.1_Level_2_Master.audit from CIS Kubernetes Benchmark v1.7.1
  • Go to Page:
  • Page 1 of 1
  • Tenable.com
  • Community & Support
  • Documentation
  • Education
  • © 2025 Tenable®, Inc. All Rights Reserved
  • Privacy Policy
  • Legal
  • 508 Compliance