Skip to content

Commit

Permalink
Merge pull request #580 from vardhaman22/1.2/k3s-cis-1.9
Browse files Browse the repository at this point in the history
[release/v1.2] added cis-1.9
  • Loading branch information
vardhaman22 authored Jan 10, 2025
2 parents 4b10811 + 5415589 commit db653d0
Show file tree
Hide file tree
Showing 17 changed files with 76 additions and 15 deletions.
4 changes: 2 additions & 2 deletions chart/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,11 +12,11 @@ annotations:
catalog.cattle.io/type: cluster-tool
catalog.cattle.io/ui-component: rancher-cis-benchmark
apiVersion: v1
appVersion: v6.5.1
appVersion: v6.6.0-rc.1
description: The cis-operator enables running CIS benchmark security scans on a kubernetes
cluster
icon: https://charts.rancher.io/assets/logos/cis-kube-bench.svg
keywords:
- security
name: rancher-cis-benchmark
version: 6.5.1
version: 6.6.0-rc.1
17 changes: 10 additions & 7 deletions chart/app-readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,13 +18,16 @@ This chart installs the following components:

| Source | Kubernetes distribution | scan profile | Kubernetes versions |
|--------|-------------------------|--------------------------------------------------------------------------------------------------------------------|---------------------|
| CIS | any | [cis-1.8](https://github.com/aquasecurity/kube-bench/tree/main/cfg/cis-1.8) | v1.26+ |
| CIS | rke | [rke-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/rke-cis-1.8-permissive) | rke1-v1.26+ |
| CIS | rke | [rke-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/rke-cis-1.8-hardened) | rke1-v1.26+ |
| CIS | rke2 | [rke2-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/rke2-cis-1.8-permissive) | rke2-v1.26+ |
| CIS | rke2 | [rke2-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/rke2-cis-1.8-hardened) | rke2-v1.26+ |
| CIS | k3s | [k3s-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/k3s-cis-1.8-permissive) | k3s-v1.26+ |
| CIS | k3s | [k3s-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/k3s-cis-1.8-hardened) | k3s-v1.26+ |
| CIS | any | [cis-1.9](https://github.com/aquasecurity/kube-bench/tree/main/cfg/cis-1.9) | v1.27+ |
| CIS | any | [cis-1.8](https://github.com/aquasecurity/kube-bench/tree/main/cfg/cis-1.8) | v1.26 |
| CIS | rke | [rke-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/rke-cis-1.8-permissive) | rke1-v1.26+ |
| CIS | rke | [rke-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/rke-cis-1.8-hardened) | rke1-v1.26+ |
| CIS | rke2 | [rke2-cis-1.9](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/rke2-cis-1.9) | rke2-v1.27+ |
| CIS | rke2 | [rke2-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/rke2-cis-1.8-permissive) | rke2-v1.26 |
| CIS | rke2 | [rke2-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/rke2-cis-1.8-hardened) | rke2-v1.26 |
| CIS | k3s | [k3s-cis-1.9](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/k3s-cis-1.9) | k3s-v1.27+ |
| CIS | k3s | [k3s-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/k3s-cis-1.8-permissive) | k3s-v1.26 |
| CIS | k3s | [k3s-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/release/v0.4/package/cfg/k3s-cis-1.8-hardened) | k3s-v1.26 |
| CIS | eks | [eks-1.2.0](https://github.com/aquasecurity/kube-bench/tree/main/cfg/eks-1.2.0) | eks |
| CIS | aks | [aks-1.0](https://github.com/aquasecurity/kube-bench/tree/main/cfg/aks-1.0) | aks |
| CIS | gke | [gke-1.2.0](https://github.com/aquasecurity/kube-bench/tree/main/cfg/gke-1.2.0) | gke-1.20 |
Expand Down
1 change: 1 addition & 0 deletions chart/templates/benchmark-cis-1.8.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,4 @@ metadata:
spec:
clusterProvider: ""
minKubernetesVersion: "1.26.0"
maxKubernetesVersion: "1.26.x"
8 changes: 8 additions & 0 deletions chart/templates/benchmark-cis-1.9.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
---
apiVersion: cis.cattle.io/v1
kind: ClusterScanBenchmark
metadata:
name: cis-1.9
spec:
clusterProvider: ""
minKubernetesVersion: "1.27.0"
1 change: 1 addition & 0 deletions chart/templates/benchmark-k3s-cis-1.8-hardened.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,4 @@ metadata:
spec:
clusterProvider: k3s
minKubernetesVersion: "1.26.0"
maxKubernetesVersion: "1.26.x"
1 change: 1 addition & 0 deletions chart/templates/benchmark-k3s-cis-1.8-permissive.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,4 @@ metadata:
spec:
clusterProvider: k3s
minKubernetesVersion: "1.26.0"
maxKubernetesVersion: "1.26.x"
8 changes: 8 additions & 0 deletions chart/templates/benchmark-k3s-cis-1.9.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
---
apiVersion: cis.cattle.io/v1
kind: ClusterScanBenchmark
metadata:
name: k3s-cis-1.9
spec:
clusterProvider: k3s
minKubernetesVersion: "1.27.0"
1 change: 1 addition & 0 deletions chart/templates/benchmark-rke2-cis-1.8-hardened.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,4 @@ metadata:
spec:
clusterProvider: rke2
minKubernetesVersion: "1.26.0"
maxKubernetesVersion: "1.26.x"
1 change: 1 addition & 0 deletions chart/templates/benchmark-rke2-cis-1.8-permissive.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,4 @@ metadata:
spec:
clusterProvider: rke2
minKubernetesVersion: "1.26.0"
maxKubernetesVersion: "1.26.x"
8 changes: 8 additions & 0 deletions chart/templates/benchmark-rke2-cis-1.9.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
---
apiVersion: cis.cattle.io/v1
kind: ClusterScanBenchmark
metadata:
name: rke2-cis-1.9
spec:
clusterProvider: rke2
minKubernetesVersion: "1.27.0"
6 changes: 3 additions & 3 deletions chart/templates/configmap.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -10,9 +10,9 @@ data:
>=1.21.0: rke-profile-permissive-1.8
rke2: |-
<1.21.0: rke2-cis-1.20-profile-permissive
>=1.21.0: rke2-cis-1.8-profile-permissive
>=1.21.0: rke2-cis-1.9-profile
eks: "eks-profile"
gke: "gke-profile-1.6.0"
aks: "aks-profile"
k3s: "k3s-cis-1.8-profile-permissive"
default: "cis-1.8-profile"
k3s: "k3s-cis-1.9-profile"
default: "cis-1.9-profile"
2 changes: 2 additions & 0 deletions chart/templates/rbac.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,7 @@ rules:
- "rolebindings"
- "clusterrolebindings"
- "clusterroles"
- "roles"
verbs:
- "get"
- "list"
Expand Down Expand Up @@ -74,6 +75,7 @@ rules:
- "rolebindings"
- "clusterrolebindings"
- "clusterroles"
- "roles"
verbs:
- "get"
- "list"
Expand Down
9 changes: 9 additions & 0 deletions chart/templates/scanprofile-cis-1.9.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
---
apiVersion: cis.cattle.io/v1
kind: ClusterScanProfile
metadata:
name: cis-1.9-profile
annotations:
clusterscanprofile.cis.cattle.io/builtin: "true"
spec:
benchmarkVersion: cis-1.9
9 changes: 9 additions & 0 deletions chart/templates/scanprofile-k3s-cis-1.9.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
---
apiVersion: cis.cattle.io/v1
kind: ClusterScanProfile
metadata:
name: k3s-cis-1.9-profile
annotations:
clusterscanprofile.cis.cattle.io/builtin: "true"
spec:
benchmarkVersion: k3s-cis-1.9
9 changes: 9 additions & 0 deletions chart/templates/scanprofile-rke2-cis-1.9.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
---
apiVersion: cis.cattle.io/v1
kind: ClusterScanProfile
metadata:
name: rke2-cis-1.9-profile
annotations:
clusterscanprofile.cis.cattle.io/builtin: "true"
spec:
benchmarkVersion: rke2-cis-1.9
4 changes: 2 additions & 2 deletions chart/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,10 +5,10 @@
image:
cisoperator:
repository: rancher/cis-operator
tag: v1.2.3
tag: v1.2.4-rc.1
securityScan:
repository: rancher/security-scan
tag: v0.4.1
tag: v0.4.2-rc.1
sonobuoy:
repository: rancher/mirrored-sonobuoy-sonobuoy
tag: v0.57.2
Expand Down
2 changes: 1 addition & 1 deletion tests/k3s-bench-test.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,5 +4,5 @@ metadata:
name: k3s-e2e-scan
namespace: cis-operator-system
spec:
scanProfileName: k3s-cis-1.8-profile-permissive
scanProfileName: k3s-cis-1.9-profile
scoreWarning: pass

0 comments on commit db653d0

Please sign in to comment.