5.10.6 Enable Security Posture

Information

Rationale:

The security posture dashboard provides insights about your workload security posture at the runtime phase of the software delivery life-cycle.

Impact:

GKE security posture configuration auditing checks your workloads against a set of defined best practices. Each configuration check has its own impact or risk. Learn more about the checks: https://cloud.google.com/kubernetes-engine/docs/concepts/about-configuration-scanning

Example: The host namespace check identifies pods that share host namespaces. Pods that share host namespaces allow Pod processes to communicate with host processes and gather host information, which could lead to a container escape

Solution

Enable security posture via the UI, gCloud or API.
https://cloud.google.com/kubernetes-engine/docs/how-to/protect-workload-configuration

Default Value:

GKE security posture has multiple features. Not all are on by default. Configuration auditing is enabled by default for new standard and autopilot clusters.

securityPostureConfig: mode: BASIC

See Also

https://workbench.cisecurity.org/benchmarks/13178

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-8(3), CSCv7|5.5

Plugin: GCP

Control ID: 05a15369b461fa52ba6fd26868e8a9f526269814c47ca131ddc5459c009ea97c