Skip to content

Commit 66dabc1

Browse files
jaredledvinachris-rock
authored andcommitted
Feature: Update to 1.4.1 (#24)
* README - State 1.4.1 Signed-off-by: Jared Ledvina <[email protected]> * 1.4.1 - 2.1.11 is now deprecated Signed-off-by: Jared Ledvina <[email protected]> * 1.4.1 - 1.1.12 is now deprecated Signed-off-by: Jared Ledvina <[email protected]>
1 parent 4de13e4 commit 66dabc1

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# CIS Kubernetes Benchmark - InSpec Profile
22

33
## Description
4-
This profile implements the [CIS Kubernetes 1.4.0 Benchmark](https://www.cisecurity.org/benchmark/kubernetes/).
4+
This profile implements the [CIS Kubernetes 1.4.1 Benchmark](https://www.cisecurity.org/benchmark/kubernetes/).
55

66
## Attributes
77

controls/1_1_master_node_api_server.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -180,9 +180,9 @@
180180
end
181181

182182
control 'cis-kubernetes-benchmark-1.1.12' do
183-
title 'Ensure that the admission control plugin DenyEscalatingExec is set'
184-
desc "Deny execution of `exec` and `attach` commands in privileged pods.\n\nRationale: Setting admission control policy to `DenyEscalatingExec` denies `exec` and `attach` commands to pods that run with escalated privileges that allow host access. This includes pods that run as privileged, have access to the host IPC namespace, and have access to the host PID namespace."
185-
impact 1.0
183+
title '[Deprecated] Ensure that the admission control plugin DenyEscalatingExec is set'
184+
desc "[Deprecated] Deny execution of `exec` and `attach` commands in privileged pods.\n\nRationale: Setting admission control policy to `DenyEscalatingExec` denies `exec` and `attach` commands to pods that run with escalated privileges that allow host access. This includes pods that run as privileged, have access to the host IPC namespace, and have access to the host PID namespace."
185+
impact 0.0
186186

187187
tag cis: 'kubernetes:1.1.12'
188188
tag level: 1

controls/2_1_worker_node_kubelet.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -158,9 +158,9 @@
158158
end
159159

160160
control 'cis-kubernetes-benchmark-2.1.11' do
161-
title 'Ensure that the --cadvisor-port argument is set to 0'
162-
desc "Disable cAdvisor.\n\nRationale: cAdvisor provides potentially sensitive data and there's currently no way to block access to it using anything other than iptables. It does not require authentication/authorization to connect to the cAdvisor port. Hence, you should disable the port.\n**Note** The cAdvisor port setting was deprecated in Kubernetes v1.10 and will be removed in v1.12."
163-
impact 1.0
161+
title '[Deprecated] Ensure that the --cadvisor-port argument is set to 0'
162+
desc "[Deprecated] Disable cAdvisor.\n\nRationale: cAdvisor provides potentially sensitive data and there's currently no way to block access to it using anything other than iptables. It does not require authentication/authorization to connect to the cAdvisor port. Hence, you should disable the port.\n**Note** The cAdvisor port setting was deprecated in Kubernetes v1.10 and will be removed in v1.12."
163+
impact 0.0
164164

165165
tag cis: 'kubernetes:2.1.11'
166166
tag level: 1

0 commit comments

Comments
 (0)