3.2.2 Ensure that the audit policy covers key security concerns

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Ensure that the audit policy created for the cluster covers key security concerns.

Rationale:

Security audit logs should cover access and modification of key resources in the cluster, to enable them to form an effective part of a security environment.

Solution

Consider modification of the audit policy in use on the cluster to include these items, at a minimum.

Impact:

Increasing audit logging will consume resources on the nodes or other log destination.

Default Value:

By default Kubernetes clusters do not log audit information.

References:

https://github.com/k8scop/k8s-security-dashboard/blob/master/configs/kubernetes/adv-audit.yaml

https://kubernetes.io/docs/tasks/debug-application-cluster/audit/#audit-policy

https://github.com/falcosecurity/falco/blob/master/examples/k8s_audit_config/audit-policy.yaml

https://github.com/kubernetes/kubernetes/blob/master/cluster/gce/gci/configure-helper.sh#L735

See Also

https://workbench.cisecurity.org/files/2662

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-2, 800-53|AU-12, CSCv6|14.6, CSCv7|14.9

Plugin: Unix

Control ID: 07108539c05ac3d8d0b22a811f433ee61d7865396a5284357b776097def1db69