5.7.1 Enable Security Posture

Information

The security posture dashboard provides insights about your workload security posture at the runtime phase of the software delivery life-cycle.

Solution

To enable Security Posture for a new cluster, be sure to add --security-posture=standard or --security-posture=enterprise when creating.

To update Security Posture for an existing cluster, run the following command:

gcloud container clusters update CLUSTER_NAME \\
--location=CONTROL_PLANE_LOCATION \\
--security-posture=standard

Replace the following:

- CLUSTER_NAME: the name of your cluster.
- CONTROL_PLANE_LOCATION: the location of the control plane of your cluster. Provide a region for regional Standard and Autopilot clusters, or a zone for zonal Standard clusters.

For console users follow the numbered steps in the console tab using the link provided: Enable configuration auditing on an existing cluster https://cloud.google.com/kubernetes-engine/docs/how-to/protect-workload-configuration#console

Impact:

GKE security posture configuration auditing checks your workloads against a set of defined best practices. Each configuration check has its own impact or risk. Learn more about the checks: About Kubernetes security posture scanning https://cloud.google.com/kubernetes-engine/docs/concepts/about-configuration-scanning and Automatically audit workloads for configuration issues https://cloud.google.com/kubernetes-engine/docs/how-to/protect-workload-configuration

Example: The host namespace check identifies pods that share host namespaces. Pods that share host namespaces allow Pod processes to communicate with host processes and gather host information, which could lead to a container escape

See Also

https://workbench.cisecurity.org/benchmarks/24113

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-8(3), CSCv7|5.5

Plugin: GCP

Control ID: 3ead45bc3f348035cbb5ed2cf9e48973e3e7f70bee12017603ac5be394e543f1