Skip to content

Commit

Permalink
Overhaul CIS scan documentation (#256)
Browse files Browse the repository at this point in the history
* Add cis-1.24 guide, minor fixes to cis-1.23

Signed-off-by: Derek Nola <[email protected]>

* Add cis-1.7 assessment

Signed-off-by: Derek Nola <[email protected]>

* Add cis-1.8 assessment

Signed-off-by: Derek Nola <[email protected]>

* Update hardening guide

Signed-off-by: Derek Nola <[email protected]>

* Update docs/security/cis_self_assessment18.md

Co-authored-by: Andy Pitcher <[email protected]>

---------

Signed-off-by: Derek Nola <[email protected]>
Co-authored-by: Andy Pitcher <[email protected]>
  • Loading branch information
dereknola and andypitcher authored Sep 11, 2024
1 parent bbd0d1d commit 63c275b
Show file tree
Hide file tree
Showing 7 changed files with 9,115 additions and 43 deletions.
11 changes: 3 additions & 8 deletions docs/security/cis_self_assessment123.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,17 +2,15 @@
title: CIS 1.23 Self-Assessment Guide
---

### CIS Kubernetes Benchmark v1.23 - RKE2

#### Overview
## Overview

This document is a companion to the RKE2 security hardening guide. The hardening guide provides prescriptive guidance for hardening a production installation of RKE2, and this benchmark guide is meant to help you evaluate the level of security of the hardened cluster against each control in the CIS Kubernetes benchmark. It is to be used by RKE2 operators, security teams, auditors, and decision makers.

This guide is specific to the **v1.25** release line of RKE2 and the **v1.23** release of the CIS Kubernetes Benchmark.
This guide is specific to the **v1.23** release line of RKE2 and the **v1.23** release of the CIS Kubernetes Benchmark.

For more details about each control, including detailed descriptions and remediations for failing tests, you can refer to the corresponding section of the CIS Kubernetes Benchmark v1.23 You can download the benchmark after logging in to [CISecurity.org](https://www.cisecurity.org/benchmark/kubernetes/).

#### Testing controls methodology
### Testing controls methodology

Each control in the CIS Kubernetes Benchmark was evaluated against an RKE2 cluster that was configured according to the accompanying hardening guide.

Expand All @@ -24,9 +22,6 @@ These are the possible results for each control:
- **Not Applicable** - The control is not applicable to RKE2 because of how it is designed to operate. The remediation section will explain why this is so.
- **Manual - Operator Dependent** - The control is Manual in the CIS benchmark and it depends on the cluster's use case or some other factor that must be determined by the cluster operator. These controls have been evaluated to ensure RKE2 does not prevent their implementation, but no further configuration or auditing of the cluster under test has been performed.

### Controls

---
## 1 Master Node Security Configuration
### 1.1 Master Node Configuration Files

Expand Down
Loading

0 comments on commit 63c275b

Please sign in to comment.