Configure CIS Kubernetes compliance checks to maintain a list of exempted users and
roles for security policy controls and standards. This includes CIS checks 5.1.1 to
5.1.4 and check 5.1.6. Refer to the error messages for these checks in your PDF or
CSV report, then update the corresponding configuration settings in Compliance Scanning
to address the errors in the report.
For more information about CIS benchmarks, see Kubernetes 1.9.0 recommendations.
The table below describes the compliance configuration settings that should be updated
for CIS Kubernetes checks.
NoteAfter making an update, save any new compliance configuration settings
before running a new scan.
|
CIS benchmark check | Compliance scan configuration settings | Configuration settings value |
5.1.1
|
Cluster Admin Role
|
Users
|
5.1.2
|
Secrets Permission
|
Users
|
5.1.3
|
Role Wildcards
|
Roles/cluster-rules
|
5.1.4
|
Pods Creation Permission |
Users
|
5.1.6
|
Allow Service Account Tokens mounting on pods
|
Service accounts for pods
|
Configuration change example
For example, for CIS check 5.1.6, you could see a failure message like the following:
"Pod service accounts
coredns,kindnet
have mounted service account tokens
with automountServiceAccountToken
set to true. Review the pod service accounts
and, if required, add them to the Pods mounted with service account tokens
list
to exempt the pod service accounts from the check." On the Compliance Scanning page, you could add the compliance scan configuration setting
for
"Allow Service Account Tokens on Pods" with the values "
coredns,kindnet
",
according to the above error message in the compliance scan report. After updating and saving these configuration settings, this check should now pass
when the
next compliance scan is run.
NoteIf a CIS compliance check returns the
error message
Could not run check in the compliance report, contact
support. |