Skip to content

Set default values to a secure value - Azure Kubernetes Services #785

@elbatane

Description

@elbatane

All default values should comply with a security baseline, e.g. NIST 800

The build-in policies of Azure can be used as a reference.

The task would be to scan over each of the following policies and make sure, that the module is per default complying to them.

The following policies are the NIST 800 ones:

  • \built-in-policies\policyDefinitions\Kubernetes\AKS_AzurePolicyAddOn_Audit.json
  • \built-in-policies\policyDefinitions\Kubernetes\AKS_CMK_Deny.json
  • \built-in-policies\policyDefinitions\Kubernetes\AKS_EncryptionAtHost_Deny.json
  • \built-in-policies\policyDefinitions\Kubernetes\AllowedHostPaths.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\AllowedUsersGroups.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\ASC_Azure_Defender_Kubernetes_Arc_Extension_Audit.json
    • On-Premise?
  • \built-in-policies\policyDefinitions\Kubernetes\BlockHostNamespace.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\ContainerAllowedCapabilities.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\ContainerAllowedImages.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\ContainerAllowedPorts.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\ContainerNoPrivilege.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\ContainerNoPrivilegeEscalation.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\ContainerResourceLimits.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\EnforceAppArmorProfile.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\HostNetworkPorts.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\IngressHttpsOnly.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\ReadOnlyRootFileSystem.json
    • Cluster internal?
  • \built-in-policies\policyDefinitions\Kubernetes\ServiceAllowedPorts.json
    • Cluster internal?

Metadata

Metadata

Assignees

No one assigned

    Labels

    [cat] modulescategory: modules[prio] highimportance of the issue: high priorityenhancementNew feature or request

    Type

    No type

    Projects

    Status

    Done

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions