CIS Kubernetes Benchmark v1.8.0 L2 Master

Audit Details

Name: CIS Kubernetes Benchmark v1.8.0 L2 Master

Updated: 2/5/2024

Authority: CIS

Plugin: Unix

Revision: 1.0

Estimated Item Count: 17

File Details

Filename: CIS_Kubernetes_v1.8.0_Level_2_Master.audit

Size: 49.7 kB

MD5: ce98fc51f033cf203beb111f6c239f9a
SHA256: c5cf1cf9ad30558b570db5213edc8947bd88de2c69f2d4408b9879ae6cb5008f

Audit Items

DescriptionCategories
1.2.12 Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used

SYSTEM AND SERVICES ACQUISITION

1.2.13 Ensure that the admission control plugin ServiceAccount is set

ACCESS CONTROL, MEDIA PROTECTION

1.2.14 Ensure that the admission control plugin NamespaceLifecycle is set

CONFIGURATION MANAGEMENT

1.2.15 Ensure that the admission control plugin NodeRestriction is set

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.16 Ensure that the --secure-port argument is not set to 0 - NoteThis recommendation is obsolete and will be deleted per the consensus process.

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.7 Ensure that a unique Certificate Authority is used for etcd

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

3.2.2 Ensure that the audit policy covers key security concerns

AUDIT AND ACCOUNTABILITY

5.2.7 Minimize the admission of root containers

ACCESS CONTROL

5.2.10 Minimize the admission of containers with capabilities assigned

CONFIGURATION MANAGEMENT

5.3.2 Ensure that all Namespaces have Network Policies defined

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.1 Prefer using secrets as files over secrets as environment variables

SYSTEM AND COMMUNICATIONS PROTECTION

5.4.2 Consider external secret storage

SYSTEM AND COMMUNICATIONS PROTECTION

5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controller

CONFIGURATION MANAGEMENT

5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions

CONFIGURATION MANAGEMENT

5.7.3 Apply Security Context to Your Pods and Containers

CONFIGURATION MANAGEMENT

5.7.4 The default namespace should not be used

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

CIS_Kubernetes_v1.8.0_Level_2_Master.audit from CIS Kubernetes Benchmark v1.8.0

CONFIGURATION MANAGEMENT