Skip to content

Commit 9b4309e

Browse files
add control, delete empty subsections
Signed-off-by: YiscahLevySilas1 <[email protected]>
1 parent c15538f commit 9b4309e

File tree

1 file changed

+13
-11
lines changed

1 file changed

+13
-11
lines changed

frameworks/cis-v1.10.0.json

+13-11
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,8 @@
7777
"C-0140",
7878
"C-0141",
7979
"C-0142",
80-
"C-0277"
80+
"C-0277",
81+
"C-0283"
8182
]
8283
},
8384
"3": {
@@ -120,11 +121,6 @@
120121
"name": "Control Plane Configuration",
121122
"id": "3",
122123
"subSections": {
123-
"1": {
124-
"name": "Authentication and Authorization",
125-
"id": "3.1",
126-
"controlsIDs": []
127-
},
128124
"2": {
129125
"name": "Logging",
130126
"id": "3.2",
@@ -172,11 +168,6 @@
172168
"C-0183",
173169
"C-0184"
174170
]
175-
},
176-
"3": {
177-
"name": "kube-proxy",
178-
"id": "4.3",
179-
"controlsIDs": []
180171
}
181172
}
182173
},
@@ -1413,6 +1404,17 @@
14131404
"impact_statement": "",
14141405
"default_value": ""
14151406
}
1407+
},
1408+
{
1409+
"controlID": "C-0283",
1410+
"patch": {
1411+
"name": "CIS-1.2.3 Ensure that the DenyServiceExternalIPs is set",
1412+
"long_description": "Most users do not need the ability to set the `externalIPs` field for a `Service` at all, and cluster admins should consider disabling this functionality by enabling the `DenyServiceExternalIPs` admission controller. Clusters that do need to allow this functionality should consider using some custom policy to manage its usage.",
1413+
"remediation": "Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml on the master node and append the Kubernetes API server flag --enable-admission-plugins with the DenyServiceExternalIPs plugin. Note, the Kubernetes API server flag --enable-admission-plugins takes a comma-delimited list of admission control plugins to be enabled, even if they are in the list of plugins enabled by default.\n\n kube-apiserver --enable-admission-plugins=DenyServiceExternalIPs",
1414+
"manual_test": "Run the following command on the Control Plane node:\n\n \n```\nps -ef | grep kube-apiserver\n\n```\n Verify that the `DenyServiceExternalIPs' argument exist as a string value in --enable-admission-plugins.",
1415+
"impact_statement": "When enabled, users of the cluster may not create new Services which use externalIPs and may not add new values to externalIPs on existing Service objects.",
1416+
"default_value": "By default, --enable-admission-plugins=DenyServiceExternalIP argument is not set, and the use of externalIPs is authorized."
1417+
}
14161418
}
14171419
]
14181420
}

0 commit comments

Comments
 (0)