1+
12# Rancher CIS Benchmarks
23
34This chart enables security scanning of the cluster using [ CIS (Center for Internet Security) benchmarks] ( https://www.cisecurity.org/benchmark/kubernetes/ ) .
@@ -18,16 +19,17 @@ This chart installs the following components:
1819
1920| Source | Kubernetes distribution | scan profile | Kubernetes versions |
2021| --------| -------------------------| --------------------------------------------------------------------------------------------------------------------| ---------------------|
21- | CIS | any | [ cis-1.9] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/cis-1.9 ) | v1.27+ |
22- | CIS | any | [ cis-1.8] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/cis-1.8 ) | v1.26 |
23- | CIS | rke | [ rke-cis-1.8-permissive] ( https://github.com/rancher/security-scan/tree/main/package/cfg/rke-cis-1.8-permissive ) | rke1-v1.26+ |
24- | CIS | rke | [ rke-cis-1.8-hardened] ( https://github.com/rancher/security-scan/tree/main/package/cfg/rke-cis-1.8-hardened ) | rke1-v1.26+ |
25- | CIS | rke2 | [ rke2-cis-1.8-permissive] ( https://github.com/rancher/security-scan/tree/main/package/cfg/rke2-cis-1.8-permissive ) | rke2-v1.26+ |
26- | CIS | rke2 | [ rke2-cis-1.8-hardened] ( https://github.com/rancher/security-scan/tree/main/package/cfg/rke2-cis-1.8-hardened ) | rke2-v1.26+ |
27- | CIS | k3s | [ k3s-cis-1.9] ( https://github.com/rancher/security-scan/tree/main/package/cfg/k3s-cis-1.9 ) | k3s-v1.27+ |
28- | CIS | k3s | [ k3s-cis-1.8-permissive] ( https://github.com/rancher/security-scan/tree/main/package/cfg/k3s-cis-1.8-permissive ) | k3s-v1.26 |
29- | CIS | k3s | [ k3s-cis-1.8-hardened] ( https://github.com/rancher/security-scan/tree/main/package/cfg/k3s-cis-1.8-hardened ) | k3s-v1.26 |
30- | CIS | eks | [ eks-1.2.0] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/eks-1.2.0 ) | eks |
31- | CIS | aks | [ aks-1.0] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/aks-1.0 ) | aks |
32- | CIS | gke | [ gke-1.2.0] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/gke-1.2.0 ) | gke-1.20 |
33- | CIS | gke | [ gke-1.6.0] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/gke-1.6.0 ) | gke-1.29+ |
22+ | CIS | any | [ cis-1.9] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/cis-1.9 ) | v1.27+ |
23+ | CIS | any | [ cis-1.8] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/cis-1.8 ) | v1.26 |
24+ | CIS | rke | [ rke-cis-1.8-permissive] ( https://github.com/rancher/security-scan/tree/release/v0.5/package/cfg/rke-cis-1.8-permissive ) | rke1-v1.26+ |
25+ | CIS | rke | [ rke-cis-1.8-hardened] ( https://github.com/rancher/security-scan/tree/release/v0.5/package/cfg/rke-cis-1.8-hardened ) | rke1-v1.26+ |
26+ | CIS | rke2 | [ rke2-cis-1.9] ( https://github.com/rancher/security-scan/tree/release/v0.5/package/cfg/rke2-cis-1.9 ) | rke2-v1.27+ |
27+ | CIS | rke2 | [ rke2-cis-1.8-permissive] ( https://github.com/rancher/security-scan/tree/release/v0.5/package/cfg/rke2-cis-1.8-permissive ) | rke2-v1.26 |
28+ | CIS | rke2 | [ rke2-cis-1.8-hardened] ( https://github.com/rancher/security-scan/tree/release/v0.5/package/cfg/rke2-cis-1.8-hardened ) | rke2-v1.26 |
29+ | CIS | k3s | [ k3s-cis-1.9] ( https://github.com/rancher/security-scan/tree/release/v0.5/package/cfg/k3s-cis-1.9 ) | k3s-v1.27+ |
30+ | CIS | k3s | [ k3s-cis-1.8-permissive] ( https://github.com/rancher/security-scan/tree/release/v0.5/package/cfg/k3s-cis-1.8-permissive ) | k3s-v1.26 |
31+ | CIS | k3s | [ k3s-cis-1.8-hardened] ( https://github.com/rancher/security-scan/tree/release/v0.5/package/cfg/k3s-cis-1.8-hardened ) | k3s-v1.26 |
32+ | CIS | eks | [ eks-1.2.0] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/eks-1.2.0 ) | eks |
33+ | CIS | aks | [ aks-1.0] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/aks-1.0 ) | aks |
34+ | CIS | gke | [ gke-1.2.0] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/gke-1.2.0 ) | gke-1.20 |
35+ | CIS | gke | [ gke-1.6.0] ( https://github.com/aquasecurity/kube-bench/tree/main/cfg/gke-1.6.0 ) | gke-1.29+ |
0 commit comments