1. Home
  2. Security Hardening
  3. DISA STIG Kubernetes V1R4
  4. CNTR-K8-000600 – The Kubernetes API Server must have an audit policy set.

CNTR-K8-000600 – The Kubernetes API Server must have an audit policy set.

Details

When Kubernetes is started, components and user services are started. For auditing startup events, and events for components and services, it is important that auditing begin on startup. Within Kubernetes, audit data for all components is generated by the API server. To enable auditing to begin, an audit policy must be defined for the events and the information to be stored with each event. It is also necessary to give a secure location where the audit logs are to be stored. If an audit log path is not specified, all audit data is sent to studio.

Solution

Edit the Kubernetes API Server manifest and set ‘–audit-policy-file’ to the audit policy file.

Note: If the API server is running as a Pod, then the manifest will also need to be updated to mount the host system filesystem where the audit policy file resides.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles