-
Notifications
You must be signed in to change notification settings - Fork 0
Issues: sandevistan-server-hardening/CIS_Kubernetes_Benchmark_v1.7.0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
1.3.7 Ensure that the --bind-address argument is set to 127.0.0.1
Level 1
Level 1 hardness
#46
opened May 4, 2023 by
scfast
1.3.6 Ensure that the RotateKubeletServerCertificate argument is set to true
Level 2
Level 2 hardness
#45
opened May 4, 2023 by
scfast
1.3.5 Ensure that the --root-ca-file argument is set as appropriate
Level 1
Level 1 hardness
#44
opened May 4, 2023 by
scfast
1.3.4 Ensure that the --service-account-private-key-file argument is set as appropriate
Level 1
Level 1 hardness
#43
opened May 4, 2023 by
scfast
1.3.3 Ensure that the --use-service-account-credentials argument is set to true
Level 1
Level 1 hardness
#42
opened May 4, 2023 by
scfast
1.3.2 Ensure that the --profiling argument is set to false
Level 1
Level 1 hardness
#41
opened May 4, 2023 by
scfast
1.2.28 Ensure that the --etcd-cafile argument is set as appropriate
Level 1
Level 1 hardness
#40
opened Apr 30, 2023 by
scfast
1.2.27 Ensure that the --client-ca-file argument is set as appropriate
Level 1
Level 1 hardness
#39
opened Apr 30, 2023 by
scfast
1.2.26 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate
Level 1
Level 1 hardness
#38
opened Apr 30, 2023 by
scfast
1.2.25 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate
Level 1
Level 1 hardness
#37
opened Apr 30, 2023 by
scfast
1.2.24 Ensure that the --service-account-key-file argument is set as appropriate
Level 1
Level 1 hardness
#36
opened Apr 30, 2023 by
scfast
1.2.23 Ensure that the --service-account-lookup argument is set to true
Level 1
Level 1 hardness
#35
opened Apr 30, 2023 by
scfast
1.2.21 Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate
Level 1
Level 1 hardness
#34
opened Apr 30, 2023 by
scfast
1.2.20 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate
Level 1
Level 1 hardness
#33
opened Apr 30, 2023 by
scfast
1.2.19 Ensure that the --audit-log-maxage argument is set to 30 or as appropriate
Level 1
Level 1 hardness
#32
opened Apr 30, 2023 by
scfast
1.2.18 Ensure that the --audit-log-path argument is set
Level 1
Level 1 hardness
#31
opened Apr 30, 2023 by
scfast
1.2.17 Ensure that the --profiling argument is set to false
Level 1
Level 1 hardness
#30
opened Apr 30, 2023 by
scfast
1.2.15 Ensure that the admission control plugin NodeRestriction is set
Level 1
Level 1 hardness
#29
opened Apr 30, 2023 by
scfast
1.2.14 Ensure that the admission control plugin NamespaceLifecycle is set
Level 1
Level 1 hardness
#28
opened Apr 30, 2023 by
scfast
1.2.13 Ensure that the admission control plugin ServiceAccount is set
Level 1
Level 1 hardness
#27
opened Apr 30, 2023 by
scfast
1.2.10 Ensure that the admission control plugin AlwaysAdmit is not set
Level 1
Level 1 hardness
#26
opened Apr 30, 2023 by
scfast
1.2.8 Ensure that the --authorization-mode argument includes RBAC
Level 1
Level 1 hardness
#25
opened Apr 30, 2023 by
scfast
1.2.7 Ensure that the --authorization-mode argument includes Node
Level 1
Level 1 hardness
#24
opened Apr 30, 2023 by
scfast
1.2.6 Ensure that the --authorization-mode argument is not set to AlwaysAllow
Level 1
Level 1 hardness
#23
opened Apr 30, 2023 by
scfast
1.2.5 Ensure that the --kubelet-certificate-authority argument is set as appropriate
Level 1
Level 1 hardness
#22
opened Apr 30, 2023 by
scfast
Previous Next
ProTip!
Add no:assignee to see everything that’s not assigned.