3.2.1 Ensure that a minimal audit policy is created

Information

Kubernetes can audit the details of requests made to the API server.

Rationale:

Logging is an important detective control for all systems, to detect potential unauthorized access.

Impact:

Audit logs will be created on the master nodes, which will consume disk space. Care should be taken to avoid generating too large volumes of log information as this could impact the available of the cluster nodes.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

None.

Default Value:

Auditing logging is enabled by default, using the Default audit profile.

Please reference the OpenShift audit logging documentation for more information on various profiles and configuration guidance.

See Also

https://workbench.cisecurity.org/benchmarks/16094

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-2, 800-53|AU-7, 800-53|AU-12, CSCv7|6.2

Plugin: OpenShift

Control ID: 8a686ed5b28102eb21dac3ea403db4c8b8568b3df8e3e0b72d5715bae09192a0