-
Notifications
You must be signed in to change notification settings - Fork 55
Add K3s cis-1.10 benchmark #447
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: Derek Nola <[email protected]>
@@ -455,6 +464,8 @@ groups: | |||
Audit: the audit retrieves each Pod's container(s) added capabilities. | |||
Condition: is_compliant is false if added capabilities are added for a given container. | |||
Default: Containers run with a default set of capabilities as assigned by the Container Runtime. | |||
K3s gives exceptions to the following pods, which are required for regular operations: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agreed, would be good to develop on why coredns
and svclb-traefik
are whitelisted in the K3s doc.
Signed-off-by: Derek Nola <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
overall similar to k3s cis 1.9
just some audits are added for 5.2.2-6 and 5.2.9 with scored: false
Signed-off-by: Derek Nola <[email protected]>
Adds k3s-cis-1.10 benchmark.
Same as upstream cis-1.10 new additions with 1 whitelist exception: