Skip to content

Commit 496ec14

Browse files
authored
fix: update checks 5.1.1, 5.1.2 and 5.1.4 for CIS 1.9 / CIS 1.10 (#1989)
* Fix the issue 1982 * remove the type manual and revert changes of test in each check * fix linter error * changed scored to false for check 5.1.3, 5.1.5, 5.1.6
1 parent c7d9863 commit 496ec14

File tree

2 files changed

+12
-12
lines changed

2 files changed

+12
-12
lines changed

cfg/cis-1.10/policies.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ groups:
3333
Where possible, first bind users to a lower privileged role and then remove the
3434
clusterrolebinding to the cluster-admin role : kubectl delete clusterrolebinding [name]
3535
Condition: is_compliant is false if rolename is not cluster-admin and rolebinding is cluster-admin.
36-
scored: true
36+
scored: false
3737

3838
- id: 5.1.2
3939
text: "Minimize access to secrets (Automated)"
@@ -46,7 +46,7 @@ groups:
4646
value: no
4747
remediation: |
4848
Where possible, remove get, list and watch access to Secret objects in the cluster.
49-
scored: true
49+
scored: false
5050

5151
- id: 5.1.3
5252
text: "Minimize wildcard use in Roles and ClusterRoles (Automated)"
@@ -93,7 +93,7 @@ groups:
9393
objects or actions.
9494
Condition: role_is_compliant is false if ["*"] is found in rules.
9595
Condition: clusterrole_is_compliant is false if ["*"] is found in rules.
96-
scored: true
96+
scored: false
9797

9898
- id: 5.1.4
9999
text: "Minimize access to create pods (Automated)"
@@ -107,7 +107,7 @@ groups:
107107
value: no
108108
remediation: |
109109
Where possible, remove create access to pod objects in the cluster.
110-
scored: true
110+
scored: false
111111
- id: 5.1.5
112112
text: "Ensure that default service accounts are not actively used (Automated)"
113113
audit: |
@@ -125,7 +125,7 @@ groups:
125125
to the Kubernetes API server.
126126
Modify the configuration of each default service account to include this value
127127
`automountServiceAccountToken: false`.
128-
scored: true
128+
scored: false
129129

130130
- id: 5.1.6
131131
text: "Ensure that Service Account Tokens are only mounted where necessary (Automated)"
@@ -158,7 +158,7 @@ groups:
158158
Condition: Pod is_compliant to true when
159159
- ServiceAccount is automountServiceAccountToken: false and Pod is automountServiceAccountToken: false or notset
160160
- ServiceAccount is automountServiceAccountToken: true notset and Pod is automountServiceAccountToken: false
161-
scored: true
161+
scored: false
162162

163163
- id: 5.1.7
164164
text: "Avoid use of system:masters group (Manual)"

cfg/cis-1.9/policies.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ groups:
3333
Where possible, first bind users to a lower privileged role and then remove the
3434
clusterrolebinding to the cluster-admin role : kubectl delete clusterrolebinding [name]
3535
Condition: is_compliant is false if rolename is not cluster-admin and rolebinding is cluster-admin.
36-
scored: true
36+
scored: false
3737

3838
- id: 5.1.2
3939
text: "Minimize access to secrets (Automated)"
@@ -46,7 +46,7 @@ groups:
4646
value: no
4747
remediation: |
4848
Where possible, remove get, list and watch access to Secret objects in the cluster.
49-
scored: true
49+
scored: false
5050

5151
- id: 5.1.3
5252
text: "Minimize wildcard use in Roles and ClusterRoles (Automated)"
@@ -93,7 +93,7 @@ groups:
9393
objects or actions.
9494
Condition: role_is_compliant is false if ["*"] is found in rules.
9595
Condition: clusterrole_is_compliant is false if ["*"] is found in rules.
96-
scored: true
96+
scored: false
9797

9898
- id: 5.1.4
9999
text: "Minimize access to create pods (Automated)"
@@ -107,7 +107,7 @@ groups:
107107
value: no
108108
remediation: |
109109
Where possible, remove create access to pod objects in the cluster.
110-
scored: true
110+
scored: false
111111
- id: 5.1.5
112112
text: "Ensure that default service accounts are not actively used (Automated)"
113113
audit: |
@@ -125,7 +125,7 @@ groups:
125125
to the Kubernetes API server.
126126
Modify the configuration of each default service account to include this value
127127
`automountServiceAccountToken: false`.
128-
scored: true
128+
scored: false
129129

130130
- id: 5.1.6
131131
text: "Ensure that Service Account Tokens are only mounted where necessary (Automated)"
@@ -158,7 +158,7 @@ groups:
158158
Condition: Pod is_compliant to true when
159159
- ServiceAccount is automountServiceAccountToken: false and Pod is automountServiceAccountToken: false or notset
160160
- ServiceAccount is automountServiceAccountToken: true notset and Pod is automountServiceAccountToken: false
161-
scored: true
161+
scored: false
162162

163163
- id: 5.1.7
164164
text: "Avoid use of system:masters group (Manual)"

0 commit comments

Comments
 (0)