-
Notifications
You must be signed in to change notification settings - Fork 715
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CIS Compliance for kubeadm #683
Comments
@jaxxstorm AFAIK audit will be fixed on 1.10 as well as etcd ca. However this is a really interesting benchmark, and IMO it will be great if you can transform this issue into a checklist of actionable items. PS. this could be also a relevant topic for kubeadm office hours meetings |
/assign @liztio |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle rotten |
@jaxxstorm so my question here would be why isn't CIS compliance as part of conformance tests and what does the CNCF thinks about that? cc @spiffxp
i cannot seem to find a link for this. if we end up with CIS related conformance tests failing for kubeadm, actions will be taken. |
^ cc @raesene |
I'm gonna own/track this work for v1.14.
https://github.com/aquasecurity/kube-bench/tree/master/cfg
The CIS benchmark would be additive to conformance. In other words, you can be conformant k8s without passing all the benchmarks, but once you do, you'll comply with this extra "profile". The profiles works on k8s conformance isn't fully proposed/finished yet. I'll put together a list of actionable items, in fact, I have a rough draft of this locally in my computer. |
/assign @yastij |
spoke with @yastij on zoom and we might get this enabled in testgrid/prow in the near future. |
@neolit123 @yastij I'm happy to help in setting up test machinery (hopefully re-using kinder) |
added P0 prio as per the 1.16 planning. |
in 2019 the topic of CIS compliance was brought in the kubeadm office hours discussing some technical aspects, proposing changes to the benchmark itself. we are not aware if any changes were made in kube-bench since then. in 2019 during a steering committee meeting, there was a discussion whether CIS is officially approved as a k8s-wide method of security benchmark. the present members at the time did not confirm that. closing in favor of: where kubeadm can provide a guide of documenting how to create a CIS compliant cluster. /close |
@neolit123: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Is this a BUG REPORT or FEATURE REQUEST?
FEATURE REQUEST:
I'd like to start working on some of the default configuration that kubeadm generates for the manifest files. Currently, the defaults aren't especially secure.
The CIS benchmarks for kubernetes are publicly available, and a lot of the issues with a kubeadm generated cluster can be fixed by updating the default configurations here: https://github.com/kubernetes/kubernetes/blob/master/cmd/kubeadm/app/phases/controlplane/manifests.go
Some of these configuration options require a bit more work than others to enable, but some (like audit log configuration) are very simple to get started with.
Any thoughts welcomed.
The text was updated successfully, but these errors were encountered: