File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (47 lines) | stat: -rw-r--r-- 1,330 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
documentation_complete: true


platform: {{{ product }}}-node

{{%- if product == "eks" %}}
{{%- set octal_perms = "0644" %}}
{{%- set text_perms = "-rw-r--r--" %}}
{{%- else %}}
{{%- set octal_perms = "0600" %}}
{{%- set text_perms = "-rw-------" %}}
{{%- endif %}}

title: 'Verify Permissions on the Worker Kubeconfig File'

description: |-
    {{{ describe_file_permissions(file="/var/lib/kubelet/kubeconfig", perms=octal_perms) }}}

rationale: |-
    If the worker kubeconfig file is writable by a group-owner or the
    world the risk of its compromise is increased. The file contains the administration configuration of the
    OpenShift cluster that is configured on the system. Protection of this file is
    critical for OpenShift security.

severity: medium

identifiers:
    cce@ocp4: CCE-83509-0

references:
    cis@eks: 3.1.1
    cis@ocp4: 4.1.9
    nerc-cip: CIP-003-8 R6,CIP-004-6 R3,CIP-007-3 R6.1
    nist: CM-6,CM-6(1)
    srg: SRG-APP-000516-CTR-001325
ocil_clause: |-
    {{{ ocil_clause_file_permissions(file="/var/lib/kubelet/kubeconfig", perms=text_perms) }}}

ocil: |-
    {{{ ocil_file_permissions(file="/var/lib/kubelet/kubeconfig", perms=text_perms) }}}

template:
    name: file_permissions
    vars:
        filepath: /var/lib/kubelet/kubeconfig
        filemode: '0600'
        filemode@eks: '0644'