mirror of
https://github.com/aquasecurity/kube-bench.git
synced 2025-01-15 18:20:54 +00:00
3a2348eba7
* Create cis-1.10 yamls and Update info - Modify yaml versions from 1.9 to 1.10 - Adapt configmap to cover cis-1.10 - Adapt docs and cmd files * Adapt master.yaml - 1.2.29 update cipher list to remove the following insecure ones (RC4-Based, 3DES-Based, RSA-Based AES CBC): TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA ticket: https://workbench.cisecurity.org/community/43/tickets/21760 * Adapt policies.yaml - 5.1.11 typo in sub-resource name 'certificatesigningrequest' https://workbench.cisecurity.org/tickets/21352 - 5.2.2 new audit to verify if a container is privileged or not. https://workbench.cisecurity.org/tickets/20919 - 5.2.3 new audit to verify the presence of hostPID opt-in across all pods. https://workbench.cisecurity.org/tickets/20919 - 5.2.4 new audit to verify the presence of hostIPC opt-in across all pods. https://workbench.cisecurity.org/tickets/20923 - 5.2.5 new audit to verify the presence of hostNetwork opt-in across all pods. https://workbench.cisecurity.org/tickets/20921 - 5.2.6 new audit to verify the presence of 'allowPrivilegeEscalation' to true across all pods' container(s) - 5.2.6 the 'allowPrivilegeEscalation' setting is moved from 'spec' to 'securityContext' https://workbench.cisecurity.org/tickets/20922 - 5.2.9 new audit to verify the presence of added capabilities across all pods' container(s) * Fix 5.2.6 remediation
7.3 KiB
7.3 KiB
CIS Kubernetes Benchmark support
kube-bench supports running tests for Kubernetes. Most of our supported benchmarks are defined in one of the following: CIS Kubernetes Benchmarks STIG Document Library
Some defined by other hardenening guides.
Source | Kubernetes Benchmark | kube-bench config | Kubernetes versions |
---|---|---|---|
CIS | 1.5.1 | cis-1.5 | 1.15 |
CIS | 1.6.0 | cis-1.6 | 1.16-1.18 |
CIS | 1.20 | cis-1.20 | 1.19-1.21 |
CIS | 1.23 | cis-1.23 | 1.22-1.23 |
CIS | 1.24 | cis-1.24 | 1.24 |
CIS | 1.7 | cis-1.7 | 1.25 |
CIS | 1.8 | cis-1.8 | 1.26 |
CIS | 1.9 | cis-1.9 | 1.27-1.29 |
CIS | 1.10 | cis-1.10 | 1.28-1.31 |
CIS | GKE 1.0.0 | gke-1.0 | GKE |
CIS | GKE 1.2.0 | gke-1.2.0 | GKE |
CIS | GKE 1.6.0 | gke-1.6.0 | GKE |
CIS | EKS 1.0.1 | eks-1.0.1 | EKS |
CIS | EKS 1.1.0 | eks-1.1.0 | EKS |
CIS | EKS 1.2.0 | eks-1.2.0 | EKS |
CIS | EKS 1.5.0 | eks-1.5.0 | EKS |
CIS | ACK 1.0.0 | ack-1.0 | ACK |
CIS | AKS 1.0.0 | aks-1.0 | AKS |
RHEL | RedHat OpenShift hardening guide | rh-0.7 | OCP 3.10-3.11 |
CIS | OCP4 1.1.0 | rh-1.0 | OCP 4.1- |
CIS | 1.6.0-k3s | cis-1.6-k3s | k3s v1.16-v1.24 |
DISA | Kubernetes Ver 1, Rel 6 | eks-stig-kubernetes-v1r6 | EKS |
CIS | TKGI 1.2.53 | tkgi-1.2.53 | vmware |
CIS | 1.7.0-rke | rke-cis-1.7 | rke v1.25-v1.27 |
CIS | 1.7.0-rke2 | rke2-cis-1.6 | rke2 v1.25-v1.27 |
CIS | 1.7.0-k3s | k3s-cis-1.7 | k3s v1.25-v1.27 |