2019-06-05 09:28:11 +00:00
# Test and config files
2019-04-09 06:10:12 +00:00
`kube-bench` runs checks specified in `controls` files that are a YAML
2019-11-05 22:59:29 +00:00
representation of the CIS Kubernetes Benchmark checks (or other distribution-specific hardening guides).
2019-04-09 06:10:12 +00:00
## Controls
`controls` is a YAML document that contains checks that must be run against a
2019-10-24 08:15:29 +00:00
specific Kubernetes node type, master or node and version.
2019-04-09 06:10:12 +00:00
`controls` is the fundamental input to `kube-bench` . The following is an example
of a basic `controls` :
2019-10-24 08:15:29 +00:00
```yml
2019-04-09 06:10:12 +00:00
---
controls:
id: 1
text: "Master Node Security Configuration"
type: "master"
groups:
- id: 1.1
text: API Server
checks:
- id: 1.1.1
text: "Ensure that the --allow-privileged argument is set (Scored)"
audit: "ps -ef | grep kube-apiserver | grep -v grep"
tests:
bin_op: or
test_items:
- flag: "--allow-privileged"
set: true
- flag: "--some-other-flag"
set: false
remediation: "Edit the /etc/kubernetes/config file on the master node and
set the KUBE_ALLOW_PRIV parameter to '--allow-privileged=false'"
scored: true
- id: 1.2
text: Scheduler
checks:
- id: 1.2.1
text: "Ensure that the --profiling argument is set to false (Scored)"
audit: "ps -ef | grep kube-scheduler | grep -v grep"
tests:
bin_op: or
test_items:
- flag: "--profiling"
set: true
- flag: "--some-other-flag"
set: false
remediation: "Edit the /etc/kubernetes/config file on the master node and
set the KUBE_ALLOW_PRIV parameter to '--allow-privileged=false'"
scored: true
```
2019-10-24 08:15:29 +00:00
`controls` is composed of a hierarchy of groups, sub-groups and checks. Each of
2019-04-09 06:10:12 +00:00
the `controls` components have an id and a text description which are displayed
in the `kube-bench` output.
2019-10-25 18:58:41 +00:00
`type` specifies what kubernetes node type a `controls` is for. Possible values
2019-04-09 06:10:12 +00:00
for `type` are `master` and `node` .
## Groups
2019-11-05 22:59:29 +00:00
`groups` is a list of subgroups that test the various Kubernetes components
2019-04-09 06:10:12 +00:00
that run on the node type specified in the `controls` .
2019-11-05 22:59:29 +00:00
For example, one subgroup checks parameters passed to the API server binary, while
2019-04-09 06:10:12 +00:00
another subgroup checks parameters passed to the controller-manager binary.
2019-10-24 08:15:29 +00:00
```yml
2019-04-09 06:10:12 +00:00
groups:
- id: 1.1
text: API Server
2019-10-24 08:15:29 +00:00
# ...
2019-04-09 06:10:12 +00:00
- id: 1.2
text: Scheduler
2019-10-24 08:15:29 +00:00
# ...
2019-04-09 06:10:12 +00:00
```
These subgroups have `id` , `text` fields which serve the same purposes described
in the previous paragraphs. The most important part of the subgroup is the
`checks` field which is the collection of actual `check` s that form the subgroup.
This is an example of a subgroup and checks in the subgroup.
2019-10-24 08:15:29 +00:00
```yml
2019-04-09 06:10:12 +00:00
id: 1.1
text: API Server
checks:
- id: 1.1.1
text: "Ensure that the --allow-privileged argument is set (Scored)"
audit: "ps -ef | grep kube-apiserver | grep -v grep"
tests:
2019-10-24 08:15:29 +00:00
# ...
2019-04-09 06:10:12 +00:00
- id: 1.1.2
text: "Ensure that the --anonymous-auth argument is set to false (Not Scored)"
audit: "ps -ef | grep kube-apiserver | grep -v grep"
tests:
2019-10-24 08:15:29 +00:00
# ...
2019-04-09 06:10:12 +00:00
```
`kube-bench` supports running a subgroup by specifying the subgroup `id` on the
command line, with the flag `--group` or `-g` .
## Check
2019-11-05 22:59:29 +00:00
The CIS Kubernetes Benchmark recommends configurations to harden Kubernetes components. These recommendations are usually configuration options and can be
2019-10-24 08:15:29 +00:00
specified by flags to Kubernetes binaries, or in configuration files.
2019-04-09 06:10:12 +00:00
2019-10-24 08:15:29 +00:00
The Benchmark also provides commands to audit a Kubernetes installation, identify
2019-04-09 06:10:12 +00:00
places where the cluster security can be improved, and steps to remediate these
identified problems.
In `kube-bench` , `check` objects embody these recommendations. This an example
`check` object:
2019-10-24 08:15:29 +00:00
```yml
2019-04-09 06:10:12 +00:00
id: 1.1.1
text: "Ensure that the --anonymous-auth argument is set to false (Not Scored)"
audit: "ps -ef | grep kube-apiserver | grep -v grep"
tests:
test_items:
- flag: "--anonymous-auth"
compare:
op: eq
value: false
set: true
remediation: |
Edit the API server pod specification file kube-apiserver
on the master node and set the below parameter.
--anonymous-auth=false
scored: false
```
2019-10-24 08:15:29 +00:00
A `check` object has an `id` , a `text` , an `audit` , a `tests` , `remediation`
2019-04-09 06:10:12 +00:00
and `scored` fields.
`kube-bench` supports running individual checks by specifying the check's `id`
as a comma-delimited list on the command line with the `--check` flag.
The `audit` field specifies the command to run for a check. The output of this
command is then evaluated for conformance with the CIS Kubernetes Benchmark
recommendation.
2019-11-05 22:59:29 +00:00
The audit is evaluated against criteria specified by the `tests`
2019-04-09 06:10:12 +00:00
object. `tests` contain `bin_op` and `test_items` .
`test_items` specify the criteria(s) the `audit` command's output should meet to
pass a check. This criteria is made up of keywords extracted from the output of
2019-10-25 18:58:41 +00:00
the `audit` command and operations that compare these keywords against
2019-04-09 06:10:12 +00:00
values expected by the CIS Kubernetes Benchmark.
2019-10-25 18:58:41 +00:00
There are two ways to extract keywords from the output of the `audit` command,
2019-04-09 06:10:12 +00:00
`flag` and `path` .
2019-11-05 22:59:29 +00:00
`flag` is used when the keyword is a command-line flag. The associated `audit`
2019-04-09 06:10:12 +00:00
command is usually a `ps` command and a `grep` for the binary whose flag we are
checking:
2019-10-24 08:15:29 +00:00
```sh
2019-04-09 06:10:12 +00:00
ps -ef | grep somebinary | grep -v grep
```
Here is an example usage of the `flag` option:
2019-10-24 08:15:29 +00:00
```yml
# ...
2019-04-09 06:10:12 +00:00
audit: "ps -ef | grep kube-apiserver | grep -v grep"
tests:
test_items:
- flag: "--anonymous-auth"
2019-10-24 08:15:29 +00:00
# ...
2019-04-09 06:10:12 +00:00
```
`path` is used when the keyword is an option set in a JSON or YAML config file.
The associated `audit` command is usually `cat /path/to/config-yaml-or-json` .
For example:
2019-10-24 08:15:29 +00:00
```yml
# ...
2019-04-09 06:10:12 +00:00
text: "Ensure that the --anonymous-auth argument is set to false (Not Scored)"
audit: "cat /path/to/some/config"
tests:
test_items:
- path: "{.someoption.value}"
2019-10-24 08:15:29 +00:00
# ...
2019-04-09 06:10:12 +00:00
```
`test_item` compares the output of the audit command and keywords using the
`set` and `compare` fields.
2019-10-24 08:15:29 +00:00
```yml
2019-04-09 06:10:12 +00:00
test_items:
- flag: "--anonymous-auth"
compare:
op: eq
value: false
set: true
```
2019-11-05 22:59:29 +00:00
`set` checks if a keyword is present in the output of the audit command or a config file. The possible values for `set` are true and false.
2019-04-09 06:10:12 +00:00
If `set` is true, the check passes only if the keyword is present in the output
of the audit command, or config file. If `set` is false, the check passes only
if the keyword is not present in the output of the audit command, or config file.
`compare` has two fields `op` and `value` to compare keywords with expected
2019-10-25 18:58:41 +00:00
value. `op` specifies which operation is used for the comparison, and `value`
2019-04-09 06:10:12 +00:00
specifies the value to compare against.
> To use `compare`, `set` must true. The comparison will be ignored if `set` is
> false
The `op` (operations) currently supported in `kube-bench` are:
- `eq` : tests if the keyword is equal to the compared value.
- `noteq` : tests if the keyword is unequal to the compared value.
- `gt` : tests if the keyword is greater than the compared value.
- `gte` : tests if the keyword is greater than or equal to the compared value.
- `lt` : tests if the keyword is less than the compared value.
- `lte` : tests if the keyword is less than or equal to the compared value.
- `has` : tests if the keyword contains the compared value.
- `nothave` : tests if the keyword does not contain the compared value.
2019-08-07 10:43:51 +00:00
- `regex` : tests if the flag value matches the compared value regular expression.
When defining regular expressions in YAML it is generally easier to wrap them in
single quotes, for example `'^[abc]$'` , to avoid issues with string escaping.
2019-04-09 06:10:12 +00:00
## Configuration and Variables
Kubernetes component configuration and binary file locations and names
2019-10-24 08:15:29 +00:00
vary based on cluster deployment methods and Kubernetes distribution used.
2019-04-09 06:10:12 +00:00
For this reason, the locations of these binaries and config files are configurable
by editing the `cfg/config.yaml` file and these binaries and files can be
referenced in a `controls` file via variables.
The `cfg/config.yaml` file is a global configuration file. Configuration files
can be created for specific Kubernetes versions (distributions). Values in the
2019-11-05 22:59:29 +00:00
version-specific config overwrite similar values in `cfg/config.yaml` .
2019-04-09 06:10:12 +00:00
2019-10-24 08:15:29 +00:00
For example, the kube-apiserver in Red Hat OCP distribution is run as
2019-04-09 06:10:12 +00:00
`hypershift openshift-kube-apiserver` instead of the default `kube-apiserver` .
This difference can be specified by editing the `master.apiserver.defaultbin`
entry `cfg/ocp-3.10/config.yaml` .
Below is the structure of `cfg/config.yaml` :
```
nodetype
|-- components
|-- component1
|-- component1
|-- bins
|-- defaultbin (optional)
|-- confs
|-- defaultconf (optional)
|-- svcs
|-- defaultsvc (optional)
|-- kubeconfig
|-- defaultkubeconfig (optional)
```
2019-10-25 18:58:41 +00:00
Every node type has a subsection that specifies the main configuration items.
2019-04-09 06:10:12 +00:00
- `components` : A list of components for the node type. For example master
will have an entry for **apiserver** , **scheduler** and **controllermanager** .
Each component has the following entries:
- `bins` : A list of candidate binaries for a component. `kube-bench` checks this
2019-08-07 10:43:51 +00:00
list and selects the first binary that is running on the node.
2019-04-09 06:10:12 +00:00
2019-10-24 08:15:29 +00:00
If none of the binaries in `bins` list is running, `kube-bench` checks if the
2019-08-07 10:43:51 +00:00
binary specified by `defaultbin` is running and terminates if none of the
binaries in both `bins` and `defaultbin` is running.
2019-04-09 06:10:12 +00:00
The selected binary for a component can be referenced in `controls` using a
variable in the form `$<component>bin` . In the example below, we reference
the selected API server binary with the variable `$apiserverbin` in an `audit`
command.
2019-10-24 08:15:29 +00:00
```yml
2019-04-09 06:10:12 +00:00
id: 1.1.1
text: "Ensure that the --anonymous-auth argument is set to false (Scored)"
audit: "ps -ef | grep $apiserverbin | grep -v grep"
2019-10-24 08:15:29 +00:00
# ...
2019-04-09 06:10:12 +00:00
```
- `confs` : A list of candidate configuration files for a component. `kube-bench`
2019-10-25 18:58:41 +00:00
checks this list and selects the first config file that is found on the node.
If none of the config files exists, `kube-bench` defaults conf to the value
2019-08-07 10:43:51 +00:00
of `defaultconf` .
2019-04-09 06:10:12 +00:00
The selected config for a component can be referenced in `controls` using a
2019-11-05 22:59:29 +00:00
variable in the form `$<component>conf` . In the example below, we reference the
2019-04-09 06:10:12 +00:00
selected API server config file with the variable `$apiserverconf` in an `audit`
command.
2019-10-24 08:15:29 +00:00
```yml
2019-04-09 06:10:12 +00:00
id: 1.4.1
text: "Ensure that the API server pod specification file permissions are
set to 644 or more restrictive (Scored)"
audit: "/bin/sh -c 'if test -e $apiserverconf; then stat -c %a $apiserverconf; fi'"
```
2019-10-25 18:58:41 +00:00
- `svcs` : A list of candidate unitfiles for a component. `kube-bench` checks this
list and selects the first unitfile that is found on the node. If none of the
2019-08-07 10:43:51 +00:00
unitfiles exists, `kube-bench` defaults unitfile to the value of `defaultsvc` .
2019-04-09 06:10:12 +00:00
The selected unitfile for a component can be referenced in `controls` via a
variable in the form `$<component>svc` . In the example below, the selected
kubelet unitfile is referenced with `$kubeletsvc` in the `remediation` of the
`check` .
2019-10-24 08:15:29 +00:00
```yml
2019-04-09 06:10:12 +00:00
id: 2.1.1
2019-10-24 08:15:29 +00:00
# ...
2019-04-09 06:10:12 +00:00
remediation: |
Edit the kubelet service file $kubeletsvc
on each worker node and set the below parameter in KUBELET_SYSTEM_PODS_ARGS variable.
--allow-privileged=false
Based on your system, restart the kubelet service. For example:
systemctl daemon-reload
systemctl restart kubelet.service
2019-10-24 08:15:29 +00:00
# ...
2019-04-09 06:10:12 +00:00
```
- `kubeconfig` : A list of candidate kubeconfig files for a component. `kube-bench`
2019-10-25 18:58:41 +00:00
checks this list and selects the first file that is found on the node. If none
2019-08-07 10:43:51 +00:00
of the files exists, `kube-bench` defaults kubeconfig to the value of
`defaultkubeconfig` .
2019-04-09 06:10:12 +00:00
2019-11-05 22:59:29 +00:00
The selected kubeconfig for a component can be referenced in `controls` with a variable in the form `$<component>kubeconfig` . In the example below, the
2019-04-09 06:10:12 +00:00
selected kubelet kubeconfig is referenced with `$kubeletkubeconfig` in the
`audit` command.
2019-10-24 08:15:29 +00:00
```yml
2019-04-09 06:10:12 +00:00
id: 2.2.1
text: "Ensure that the kubelet.conf file permissions are set to 644 or
more restrictive (Scored)"
audit: "/bin/sh -c 'if test -e $kubeletkubeconfig; then stat -c %a $kubeletkubeconfig; fi'"
2019-10-24 08:15:29 +00:00
# ...
2019-04-09 06:10:12 +00:00
```