Benchmark: DaemonSet
Description
This section contains recommendations for configuring DaemonSet resources.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-kubernetes-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select DaemonSet.
Run this benchmark in your terminal:
powerpipe benchmark run kubernetes_compliance.benchmark.all_controls_daemonset
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run kubernetes_compliance.benchmark.all_controls_daemonset --share
Controls
- DaemonSet containers should has admission capability restricted
- DaemonSet containers admission control plugin should be set to 'always pull images'
- DaemonSet containers admission control plugin should not be set to 'always admit'
- DaemonSet containers peer client cert auth should be enabled
- DaemonSet containers argument anonymous auth should be disabled
- DaemonSet containers should have audit log max-age set to 30 or greater
- DaemonSet containers should have audit log max backup set to 10 or greater
- DaemonSet containers should have audit log max size set to 100 or greater
- DaemonSet containers should have audit log path configured appropriately
- DaemonSet containers argument authorization mode should not be set to 'always allow'
- DaemonSet containers argument authorization mode should have node
- DaemonSet containers argument authorization mode should have RBAC
- DaemonSet containers argument etcd auto TLS should be disabled
- DaemonSet containers argument etcd cafile should be set
- DaemonSet containers should have etcd certfile and keyfile configured appropriately
- DaemonSet containers argument etcd client cert auth should be enabled
- DaemonSet containers should have etcd peer certfile and peer keyfile configured appropriately
- DaemonSet containers argument event qps should be less than 5
- DaemonSet containers argument insecure port should be set to 0
- DaemonSet containers argument apiserver etcd certfile and keyfile should be configured
- DaemonSet containers kube-apiserver profiling should be disabled
- DaemonSet containers should have kube-apiserver TLS cert file and TLS private key file configured appropriately
- DaemonSet containers argument kube-controller-manager bind address should be set to 127.0.0.1
- DaemonSet containers kube controller manager profiling should be disabled
- DaemonSet containers should have kube controller manager root CA file configured appropriately
- DaemonSet containers argument kube controller manager service account credentials should be enabled
- DaemonSet containers should have kube controller manager service account private key file configured appropriately
- DaemonSet containers argument kube-scheduler bind address should be set to 127.0.0.1
- DaemonSet containers kube scheduler profiling should be disabled
- DaemonSet containers argument kubelet authorization mode should not be set to 'always allow'
- DaemonSet containers should have kubelet client CA file configured appropriately
- DaemonSet containers argument kubelet client certificate and key should be configured
- DaemonSet containers argument kubelet HTTPS should be enabled
- DaemonSet containers argument kubelet read-only port should be set to 0
- DaemonSet containers should have kubelet terminated pod gc threshold configured appropriately
- DaemonSet containers should have kubelet TLS cert file and TLS private key file configured appropriately
- DaemonSet containers argument make iptables util chains should be enabled
- DaemonSet containers argument admission control plugin NamespaceLifecycle should be enabled
- DaemonSet containers argument admission control plugin NodeRestriction should be enabled
- DaemonSet containers argument admission control plugin PodSecurityPolicy should be enabled
- DaemonSet containers argument protect kernel defaults should be enabled
- DaemonSet containers argument request timeout should be set as appropriate
- DaemonSet containers argument rotate kubelet server certificate should be enabled
- DaemonSet containers argument secure port should not be set to 0
- DaemonSet containers argument admission control plugin where either PodSecurityPolicy or SecurityContextDeny should be enabled
- DaemonSet containers argument admission control plugin ServiceAccount should be enabled
- DaemonSet containers --service-account-key-file argument should be set as appropriate
- DaemonSet containers argument service account lookup should be enabled
- DaemonSet containers should minimize its admission with capabilities assigned
- DaemonSet containers should has encryption providers configured appropriately
- DaemonSet containers ports should not have host port specified
- DaemonSet containers has image pull policy set to Always
- DaemonSet containers have image tag specified which should be fixed not latest or blank
- DaemonSet containers should have kubelet certificate authority configured appropriately
- DaemonSet containers Kubernetes dashboard should not be deployed
- DaemonSet containers should have liveness probe
- DaemonSet containers argument basic auth file should not be set
- DaemonSet containers argument hostname override should not be configured
- DaemonSet containers argument insecure bind address should not be set
- DaemonSet containers should not have privileged access
- DaemonSet containers should not allow privilege escalation
- DaemonSet containers should not be mapped with privilege ports
- DaemonSet containers should have readiness probe
- DaemonSet containers certificate rotation should be enabled
- DaemonSet containers should have secrets defined as files
- DaemonSet containers should has security context defined
- DaemonSet containers argument --streaming-connection-idle-timeout should not be set to 0
- DaemonSet containers kube-apiserver should only make use of strong cryptographic ciphers
- DaemonSet containers kubelet should only make use of strong cryptographic ciphers
- DaemonSet containers should not use CAP_SYS_ADMIN linux capability
- DaemonSet containers token auth file should not be configured
- DaemonSet containers should minimize the admission of containers with added capability
- DaemonSet containers should have a CPU limit
- DaemonSet containers should have a CPU request
- DaemonSet definition should not use default namespace
- Seccomp profile is set to docker/default in DaemonSet definition
- DaemonSet containers should not run with host network access
- DaemonSet containers should not share the host process namespace
- DaemonSet containers should run with a read only root file system
- DaemonSet containers should have a memory limit
- DaemonSet containers should have a memory request
- DaemonSet containers should not run with root privileges