Giter VIP home page Giter VIP logo

kubernetes-cis-benchmark's Introduction

NeuVector

NeuVector Full Lifecycle Container Security Platform delivers the only cloud-native security with uncompromising end-to-end protection from DevOps vulnerability protection to automated run-time security, and featuring a true Layer 7 container firewall.

A viewable version of docs can be seen at https://open-docs.neuvector.com.

The images are on the NeuVector Docker Hub registry. Use the appropriate version tag for the manager, controller, enforcer, and leave the version as 'latest' for scanner and updater. For example:

  • neuvector/manager:5.0.0
  • neuvector/controller:5.0.0
  • neuvector/enforcer:5.0.0
  • neuvector/scanner:latest
  • neuvector/updater:latest

Note: Deploying from the Rancher Manager 2.6.5+ NeuVector chart pulls from the rancher-mirrored repo and deploys into the cattle-neuvector-system namespace.

License

Copyright © 2016-2022 NeuVector Inc. All Rights Reserved

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

kubernetes-cis-benchmark's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

kubernetes-cis-benchmark's Issues

Enable to specify command for check_argument externally

Right now the command is hardcoded in every check in, f.e. in https://github.com/neuvector/kubernetes-cis-benchmark/blob/master/1.8/worker/worker_1_kubelet.sh

check_argument 'kubelet'

If I run kubelet as hyperkube it will show me wrong results.

I propose to enable to pass that command externally.
F.e.:
Add
CIS_KUBELET_CMD=${CIS_KUBELET_CMD:-kubelet}
and then
check_argument '$CIS_KUBELET_CMD'

In such case I could run:

export CIS_KUBELET_CMD="hyperkube kubelet"
./worker.sh 1.8

kubelet '--allow-privileged' falsely marked as disabled

My kubelet is started with

kubelet --address=192.168.0.10 --allow-privileged --anonymous-auth=false --authentication-token-webhook --authorization-mode=Webhook --cadvisor-port=0 --cluster-dns=10.0.0.10 --cluster-domain=cluster.local --kubeconfig=/etc/kubernetes/kubeconfig-kubelet --pod-manifest-path=/etc/kubernetes/manifests --read-only-port=0 --require-kubeconfig

Yet the benchmark reports

[PASS] 2.1.1  - Ensure that the --allow-privileged argument is set to false

Audit policy metadata-only rule should include `serviceaccounts/token` resource

The following files reference a metadata-only audit policy in order to prevent logging request/response contents for sensitive resources:

A recent bugfix resolves logging of subresource requests which would previously fail with an error. The serviceaccounts/token subresource responds to TokenRequest API calls with a newly minted service account token.

The serviceaccounts/token resource should also be included in the metadata-only audit policy if credentials are not intended to appear in the audit log.

check_2_1_8

As per CIS document "Verify that if the --make-iptables-util-chains argument exists then it is set to true"
But in the script it will only make pass if --make-iptables-util-chains=false
Kindly review and correct me if iam wrong

Document sources for best practises

This script claims to test against best practises for k8s clusters and the checks seem to be sound.
Nonetheless are there any sources for these best practises? If so it would be nice to link/explain(?) them in the README.md.

Btw: thank you for mainting this set of scripts!

Wrong permissions for kube-*.json

The following (correct) permissions yield a warning:

-rw-r-----. 1 root root 1796 Jun 30 19:04 kube-apiserver.json
-rw-r-----. 1 root root 1873 Jun 30 18:58 kube-controller-manager.json
-rw-r-----. 1 root root 1406 Jun 30 18:39 kube-proxy.json
-rw-r-----. 1 root root 1440 Jun 30 18:39 kube-scheduler.json

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.