Information
Ensure that the audit policy created for the cluster covers key security concerns.
Rationale:
Security audit logs should cover access and modification of key resources in the cluster, to enable them to form an effective part of a security environment.
Impact:
Increasing audit logging will consume resources on the nodes or other log destination.
Solution
Consider modification of the audit policy in use on the cluster to include these items, at a minimum.
Default Value:
By default Kubernetes clusters do not log audit information.