1. Home
  2. Security Hardening
  3. CIS Kubernetes 1.8 Benchmark V1.2.0 L2
  4. Create network segmentation using Network Policies

Create network segmentation using Network Policies

Details

Use network policies to isolate your cluster network.

Rationale:

Running different applications on the same Kubernetes cluster creates a risk of one compromised application attacking a neighboring application. Network segmentation is important to ensure that containers can communicate only with those they are supposed to. A network policy is a specification of how selections of pods are allowed to communicate with each other and other network endpoints. ‘NetworkPolicy’ resources use labels to select pods and define whitelist rules which allow traffic to the selected pods in addition to what is allowed by the isolation policy for a given namespace.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Follow the documentation and create ‘NetworkPolicy’ objects as you need them.

Impact:

You need a networking solution which supports ‘NetworkPolicy’ – simply creating the resource without a controller to implement it will have no effect.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: System and Communications Protection.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles