STIGQter STIGQter: STIG Summary: Kubernetes Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 13 Apr 2021:

The Kubernetes API Server must have an audit log path set.

DISA Rule

SV-242402r712562_rule

Vulnerability Number

V-242402

Group Title

SRG-APP-000092-CTR-000165

Rule Version

CNTR-K8-000610

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the Kubernetes API Server manifest and set "--audit-log-path" to a secure location for the audit logs to be written.

Note: If the API server is running as a Pod, then the manifest will also need to be updated to mount the host system filesystem where the audit log file is to be written.

Check Contents

Change to the /etc/kubernetes/manifests directory on the Kubernetes Master Node. Run the command:

grep -i audit-log-path *

If the audit-log-path is not set, this is a finding.

Vulnerability Number

V-242402

Documentable

False

Rule Version

CNTR-K8-000610

Severity Override Guidance

Change to the /etc/kubernetes/manifests directory on the Kubernetes Master Node. Run the command:

grep -i audit-log-path *

If the audit-log-path is not set, this is a finding.

Check Content Reference

M

Target Key

5376

Comments