CIS Kubernetes 1.13 Benchmark v1.4.1 L1

Audit Details

Name: CIS Kubernetes 1.13 Benchmark v1.4.1 L1

Updated: 6/17/2024

Authority: CIS

Plugin: Unix

Revision: 1.12

Estimated Item Count: 113

File Details

Filename: CIS_Kubernetes_v1.4.1_Level_1.audit

Size: 259 kB

MD5: 4ff957edb4e0da94aead2296dfc76c9a
SHA256: 4380629b62e71356d0660099dfd9261d9c165c649404878e396ec8ccd071b86d

Audit Items

DescriptionCategories
1.1.1 Ensure that the --anonymous-auth argument is set to false

IDENTIFICATION AND AUTHENTICATION

1.1.2 Ensure that the --basic-auth-file argument is not set

IDENTIFICATION AND AUTHENTICATION

1.1.3 Ensure that the --insecure-allow-any-token argument is not set

IDENTIFICATION AND AUTHENTICATION

1.1.4 Ensure that the --kubelet-https argument is set to true

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.5 Ensure that the --insecure-bind-address argument is not set

SYSTEM AND INFORMATION INTEGRITY

1.1.6 Ensure that the --insecure-port argument is set to 0

SYSTEM AND INFORMATION INTEGRITY

1.1.7 Ensure that the --secure-port argument is not set to 0

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.8 Ensure that the --profiling argument is set to false

CONFIGURATION MANAGEMENT

1.1.9 Ensure that the --repair-malformed-updates argument is set to false

CONFIGURATION MANAGEMENT

1.1.10 Ensure that the admission control plugin AlwaysAdmit is not set

ACCESS CONTROL

1.1.11 Ensure that the admission control plugin AlwaysPullImages is set

ACCESS CONTROL

1.1.13 Ensure that the admission control plugin SecurityContextDeny is set

ACCESS CONTROL

1.1.14 Ensure that the admission control plugin NamespaceLifecycle is set

ACCESS CONTROL

1.1.15 Ensure that the --audit-log-path argument is set as appropriate

AUDIT AND ACCOUNTABILITY

1.1.16 Ensure that the --audit-log-maxage argument is set to 30 or as appropriate

AUDIT AND ACCOUNTABILITY

1.1.17 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate

AUDIT AND ACCOUNTABILITY

1.1.18 Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate

AUDIT AND ACCOUNTABILITY

1.1.19 Ensure that the --authorization-mode argument is not set to AlwaysAllow

SYSTEM AND INFORMATION INTEGRITY

1.1.20 Ensure that the --token-auth-file parameter is not set

IDENTIFICATION AND AUTHENTICATION

1.1.21 Ensure that the --kubelet-certificate-authority argument is set as appropriate

IDENTIFICATION AND AUTHENTICATION

1.1.22 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - certificate

IDENTIFICATION AND AUTHENTICATION

1.1.22 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - key

IDENTIFICATION AND AUTHENTICATION

1.1.23 Ensure that the --service-account-lookup argument is set to true

IDENTIFICATION AND AUTHENTICATION

1.1.24 Ensure that the admission control plugin PodSecurityPolicy is set

ACCESS CONTROL

1.1.25 Ensure that the --service-account-key-file argument is set as appropriate

IDENTIFICATION AND AUTHENTICATION

1.1.26 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate - certfile

IDENTIFICATION AND AUTHENTICATION

1.1.26 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate - keyfile

IDENTIFICATION AND AUTHENTICATION

1.1.27 Ensure that the admission control plugin ServiceAccount is set

ACCESS CONTROL

1.1.28 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - cert

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.28 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - key

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.29 Ensure that the --client-ca-file argument is set as appropriate

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.30 Ensure that the API Server only makes use of Strong Cryptographic Ciphers

IDENTIFICATION AND AUTHENTICATION

1.1.31 Ensure that the --etcd-cafile argument is set as appropriate

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.32 Ensure that the --authorization-mode argument includes Node

SYSTEM AND INFORMATION INTEGRITY

1.1.33 Ensure that the admission control plugin NodeRestriction is set

ACCESS CONTROL

1.1.34 Ensure that the --encryption-provider-config argument is set as appropriate

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.35 Ensure that the encryption provider is set to aescbc

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.36 Ensure that the admission control plugin EventRateLimit is set

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.1.37 Ensure that the AdvancedAuditing argument is not set to false - AdvancedAuditing

AUDIT AND ACCOUNTABILITY

1.1.37 Ensure that the AdvancedAuditing argument is not set to false - AUDIT_POLICY_FILE

AUDIT AND ACCOUNTABILITY

1.1.37 Ensure that the AdvancedAuditing argument is not set to false - audit-policy-file

AUDIT AND ACCOUNTABILITY

1.1.38 Ensure that the --request-timeout argument is set as appropriate

AUDIT AND ACCOUNTABILITY

1.1.39 Ensure that the --authorization-mode argument includes RBAC

SYSTEM AND INFORMATION INTEGRITY

1.2.1 Ensure that the --profiling argument is set to false

CONFIGURATION MANAGEMENT

1.2.2 Ensure that the --address argument is set to 127.0.0.1

SYSTEM AND INFORMATION INTEGRITY

1.3.1 Ensure that the --terminated-pod-gc-threshold argument is set as appropriate

CONFIGURATION MANAGEMENT

1.3.2 Ensure that the --profiling argument is set to false

CONFIGURATION MANAGEMENT

1.3.3 Ensure that the --use-service-account-credentials argument is set to true

ACCESS CONTROL

1.3.4 Ensure that the --service-account-private-key-file argument is set as appropriate

IDENTIFICATION AND AUTHENTICATION

1.3.5 Ensure that the --root-ca-file argument is set as appropriate

SYSTEM AND COMMUNICATIONS PROTECTION