2.2.2 Ensure that the audit policy covers key security concerns

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version


Ensure that the audit policy created for the cluster covers key security concerns.


Security audit logs should cover access and modification of key resources in the cluster, to enable them to form an effective part of a security environment.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.


This control cannot be modified in GKE.


Increasing audit logging will consume resources on the nodes or other log destination.

Default Value:

See the GKE documentation for the default value.

See Also