You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/security/hardening-guide.md
+75-52Lines changed: 75 additions & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,6 +32,80 @@ kernel.panic=10
32
32
kernel.panic_on_oops=1
33
33
```
34
34
35
+
## Configuration for Kubernetes Components
36
+
37
+
38
+
The configuration below should be placed in the [configuration file](../installation/configuration.md#configuration-file), and contains all the necessary remediations to harden the Kubernetes components.
The runtime requirements to comply with the CIS Benchmark are centered around pod security (via PSP or PSA), network policies and API Server auditing logs. These are outlined in this section.
@@ -487,6 +561,7 @@ kube-apiserver-arg:
487
561
- 'audit-log-maxage=30'
488
562
- 'audit-log-maxbackup=10'
489
563
- 'audit-log-maxsize=100'
564
+
- 'service-account-extend-token-expiration=false'
490
565
```
491
566
</TabItem>
492
567
<TabItem value="cmdline">
@@ -506,58 +581,6 @@ sudo systemctl daemon-reload
506
581
sudo systemctl restart k3s.service
507
582
```
508
583
509
-
## Configuration for Kubernetes Components
510
-
511
-
512
-
The configuration below should be placed in the [configuration file](../installation/configuration.md#configuration-file), and contains all the necessary remediations to harden the Kubernetes components.
The following are controls that K3s currently does not pass by with the above configuration applied. These controls require manual intervention to fully comply with the CIS Benchmark.
This document is a companion to the [K3s security hardening guide](hardening-guide.md). The hardening guide provides prescriptive guidance for hardening a production installation of K3s, and this benchmark guide is meant to help you evaluate the level of security of the hardened cluster against each control in the CIS Kubernetes Benchmark. It is to be used by K3s operators, security teams, auditors, and decision-makers.
8
8
9
-
This guide is specific to the **v1.28-v1.33** release line of K3s and the **v1.10** release of the CIS Kubernetes Benchmark.
9
+
This guide is specific to the **v1.28-v1.31** release line of K3s and the **v1.10** release of the CIS Kubernetes Benchmark.
10
10
11
11
For more information about each control, including detailed descriptions and remediations for failing tests, you can refer to the corresponding section of the CIS Kubernetes Benchmark v1.9. You can download the benchmark, after creating a free account, in [Center for Internet Security (CIS)](https://www.cisecurity.org/benchmark/kubernetes).
0 commit comments