File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (39 lines) | stat: -rw-r--r-- 1,165 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
documentation_complete: true


title: 'Verify Permissions on the pod log files'

platform: ocp4-node

description: |-
    All logs must be owned by root user and group and have permissions
    755. By default, the path for the Kubernetes pod logs is
    <pre>/var/log/pods/</pre>.

rationale: |-
    Pod log files may contain sensitive information such as application
    data, user credentials, or system configurations. Unauthorized access
    to these log files can expose sensitive data to malicious actors. By
    setting owner permissions, OpenShift ensures that only authorized users
    or processes with the necessary privileges can access the pod log files,
    preserving the confidentiality of the logged information.

severity: medium

identifiers:
    cce@ocp4: CCE-88583-0

references:
    srg: SRG-APP-000118-CTR-000240

ocil_clause: '{{{ ocil_clause_file_permissions(file="/var/log/pods/*", perms="-rwxr-xr-x") }}}'

ocil: |-
    {{{ ocil_file_permissions(file="/var/log/pods/*", perms="-rwxr-xr-x") }}}

template:
    name: file_permissions
    vars:
        filepath: ^/var/log/pods/.*$
        filemode: '0755'
        filepath_is_regex: "true"