Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add CIS Kubernetes CIS-1.10 for k8s v1.28 - v1.31 #1753

Merged
merged 5 commits into from
Jan 13, 2025

Conversation

andypitcher
Copy link
Contributor

@andypitcher andypitcher commented Dec 11, 2024

Parent issue:

CIS Kubernetes Benchmark CIS-1.10

CIS Workbench: https://workbench.cisecurity.org/benchmarks/17568
K8s version: v1.28 to v1.31
Changelog details in CIS Workbench:
All the checks remain the same as CIS-1.9, only these were changed:

  • 5.2.2 to 5.2.6 and 5.2.9 in policies.yaml have been given a dedicated audit, while remaining Manual. Note, the audits are not directly tied to the recommendation (check admission policy), but proactively verifying the running configuration for each container.
  • 5.1.11 in policies.yaml typo correction in title/remediation.
  • 1.2.29 in master.yaml update cipher list to remove insecure ones.

@andypitcher andypitcher force-pushed the cis-1.10 branch 2 times, most recently from 39174a1 to d32c316 Compare December 12, 2024 13:27
@andypitcher andypitcher force-pushed the cis-1.10 branch 3 times, most recently from 09c3f2f to 799d11d Compare December 30, 2024 14:05
@andypitcher andypitcher marked this pull request as ready for review December 30, 2024 14:11
@mozillazg mozillazg self-requested a review January 9, 2025 14:38
	- Modify yaml versions from 1.9 to 1.10
	- Adapt configmap to cover cis-1.10
	- Adapt docs and cmd files
	- 1.2.29 update cipher list to remove the following insecure ones (RC4-Based, 3DES-Based, RSA-Based AES CBC):
          TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
          TLS_RSA_WITH_3DES_EDE_CBC_SHA,
          TLS_RSA_WITH_AES_128_CBC_SHA256,
          TLS_RSA_WITH_AES_128_CBC_SHA,
          TLS_RSA_WITH_AES_256_CBC_SHA,
          TLS_RSA_WITH_RC4_128_SHA,
          TLS_ECDHE_RSA_WITH_RC4_128_SHA
          ticket: https://workbench.cisecurity.org/community/43/tickets/21760
	- 5.1.11 typo in sub-resource name 'certificatesigningrequest' https://workbench.cisecurity.org/tickets/21352
	- 5.2.2 new audit to verify if a container is privileged or not. https://workbench.cisecurity.org/tickets/20919
	- 5.2.3 new audit to verify the presence of hostPID opt-in across all pods. https://workbench.cisecurity.org/tickets/20919
	- 5.2.4 new audit to verify the presence of hostIPC opt-in across all pods. https://workbench.cisecurity.org/tickets/20923
	- 5.2.5 new audit to verify the presence of hostNetwork opt-in across all pods. https://workbench.cisecurity.org/tickets/20921
	- 5.2.6 new audit to verify the presence of 'allowPrivilegeEscalation' to true across all pods' container(s)
	- 5.2.6 the 'allowPrivilegeEscalation' setting is moved from 'spec' to 'securityContext' https://workbench.cisecurity.org/tickets/20922
	- 5.2.9 new audit to verify the presence of added capabilities across all pods' container(s)
Copy link
Collaborator

@mozillazg mozillazg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, Thanks for your contribution!

@mozillazg mozillazg requested a review from afdesk January 11, 2025 03:18
Copy link
Collaborator

@afdesk afdesk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! thanks for contribution!

@afdesk afdesk merged commit 3a2348e into aquasecurity:main Jan 13, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants