Directory and LDAP Support 4 4 4 2 Pod and Network Security Policies 4 3 2 2 Configurable Adherence to CIS 4 3 2 2 Global RBAC Policies 4 2 3 2 2.4 Shared Tools and Services Once Users must use a browser-based workflow to perform authentication. 3.2.2 Pod and Network Security Policies • SUSE Rancher: 4 • OpenShift: 3 • Tanzu: 2 • Anthos: 2 3.2.2.1 SUSE Rancher downstream clusters. This ensures conformance and reduces the risk of human error when changing policies. PSPs can be created and edited through the UI. SUSE Rancher also ships with OPA Gatekeeper as
controller should only be used where Pod Security Policies cannot be used on the cluster, as it can interact poorly with certain Pod Security Policies Several system services (such as nginx-ingress ) Mitigation Make sure nodes with role:controlplane are on the same local network as your nodes with role:worker . Use network ACLs to restrict connections to the kubelet port (10250/tcp) on worker nodes that the Container Network Interface file permissions are set to 644 or more restrictive (Not Scored) Notes This is a manual check. Audit ( /var/lib/cni/networks/k8s-pod-network ) Note This may return
Configure Kernel Runtime Parameters Configure etcd user and group Ensure that all Namespaces have Network Policies defined Reference Hardened RKE cluster.yml configuration Reference Hardened RKE Template configuration Namespaces have Network Policies defined Running different applications on the same Kubernetes cluster creates a risk of one compromised application attacking a neighboring application. Network segmentation supposed to. A network policy is a specification of how selections of pods are allowed to communicate with each other and other network endpoints. Network Policies are namespace scoped. When a network policy
Configure Kernel Runtime Parameters Configure etcd user and group Ensure that all Namespaces have Network Policies defined Reference Hardened RKE cluster.yml configuration Reference Hardened RKE Template configuration Namespaces have Network Policies defined Running different applications on the same Kubernetes cluster creates a risk of one compromised application attacking a neighboring application. Network segmentation v2.4 5 network policy is a specification of how selections of pods are allowed to communicate with each other and other network endpoints. Network Policies are namespace scoped. When a network policy
categorization, see Appendix A on page 38. Title ID Risk Inability To Secure Control Plane Network Communications 004 High Lack of Security Related Documentation 016 High Lack of VirtualService Assessment Google / NCC Group Confidential Finding Details Finding Inability To Secure Control Plane Network Communications Risk High Impact: High, Exploitability: Medium Identifier NCC-GOIST2005-004 Category Istio should not have any plaintext endpoints exposed via its control plane and should enforce all network communications use mTLS (or at minimum, TLS) for communi- cations within the istio-system namespace
(Automated) 1.1.9 Ensure that the Container Network Interface file permissions are set to 644 or more restrictive (Manual) 1.1.10 Ensure that the Container Network Interface file ownership is set to root:root 6 Ensure that Service Account Tokens are only mounted where necessary (Manual) 5.2 Pod Security Policies 5.2.1 Minimize the admission of privileged containers (Manual) 5.2.2 Minimize the admission of host IPC namespace (Automated) 5.2.4 Minimize the admission of containers wishing to share the host network namespace (Automated) 5.2.5 Minimize the admission of containers with allowPrivilegeEscalation (Automated)