1.1.36 Ensure that the AdvancedAuditing argument is not set to false - audit-policy-file parameter

Information

Do not disable advanced auditing.

Rationale:

'AdvancedAuditing' enables a much more general API auditing pipeline, which includes support for pluggable output backends and an audit policy specifying how different requests should be audited. Additionally, this enables auditing of failed authentication, authorization and login attempts which could prove crucial for protecting your production clusters. It is thus recommended not to disable advanced auditing.

Solution

Follow the Kubernetes documentation and set the desired audit policy in the '/etc/kubernetes/audit-policy.yaml' file.

Then, edit the API server pod specification file '/etc/kubernetes/manifests/kube-apiserver.yaml' and set the below parameters.

--audit-policy-file=/etc/kubernetes/audit-policy.yaml

Impact:

You would need to rotate logs and log them centrally to avoid filling up disk space.

See Also

https://workbench.cisecurity.org/files/1788

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c., CSCv6|14.6

Plugin: Unix

Control ID: 64df796cdb474db4e9e7d2b3af3b15dfa5e1c916a7776bc6654aa8b0f99d89e3