-
Notifications
You must be signed in to change notification settings - Fork 278
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update CIS Kubernetes Benchmark to v1.7.0 for RKE2 v1.25/26/27 #4103
Comments
All issues around cis-1.7 support have been resolved at this point. using the |
Moving this back to Working as it has not yet been backported (ref: https://github.com/rancher/rke2/blob/release-1.25/pkg/rke2/rke2.go#L67) |
Validated on master branch with commit a52b3abEnvironment DetailsInfrastructure
Node(s) CPU architecture, OS, and Version:
Cluster Configuration:
Config.yaml:
Testing Steps
Validation Results:
Cluster Status:
|
Upon setting up RKE2 v1.25.8+rke2r1 I discovered the latest RKE2 CIS profile is v1.23 which was developed for K8s v1.23. That benchmark was last updated by CIS on 5/13/2022 as v1.0.1 of the v1.23 Benchmark and is not intended for K8s v1.25. Additionally, it looks like K8s v1.23 EOL was February 2023.
Describe the solution you'd like
Is it possible to add the correct CIS profile for RKE2 v1.25/26/27? The correct CIS Benchmark appears from the list below to be v1.7.0 and not v1.23
The naming convention from the Center for Internet Security could be better. Its confusing, so I've posted the latest 4 descriptions that match RKE2 versions of CIS Benchmarks and K8s:
CIS Benchmark v1.6.1 for K8s v1.18 Last updated 10/01/2020
CIS Benchmark v1.23 for K8s v1.23 Last updated 5/13/2022
CIS Benchmark v1.24 for K8s v1.24 Last updated 9/21/2022
CIS Benchmark v1.7.0 for K8s v1.25 Last updated 3/20/2023
The benchmarks are available as pdf files through normal searching on GitHub, etc.
There are ~12 rule changes between v1.23 and v1.7.0
Rules: 1.2.3, 1.2.16, 3.1.2, 3.1.3, 4.2.6, 4.2.8, 4.2.13, 5.1.9, 5.1.10, 5.1.11, 5.1.12 & 5.1.13.
It remains to be seen if the return to the original benchmark versioning implies that v1.7.0 will cover anything beyond K8s v1.25 with EOL suggested in October 2023.
Previous benchmarks ending with 1.6.1 each covered up to 3 major releases (1.6.1 covered K8s v1.16 - v1.18) so its possible that v1.7.0 could cover K8s v1.25 - v1.27. Would be great if CIS addressed this.
Describe alternatives you've considered
According to Pod Security Policy for RKE2 v1.25, CIS profile v1.23 needs to be used to enforce restricted mode.
Ive considered installing RKE2 v1.25.8+rke2r1 with CIS profile v1.23. If one takes that path, how would you update the benchmark to v1.7.0 after installation and ensure that v1.7.0 is the Benchmark enforced throughout Rancher products?
It appears that cis-1.23 is the only benchmark recognized by Rancher products for RKE2 v1.25.X.
Additional context
K8s version deprecation is fast moving by design. This makes it difficult for open source projects to keep up with other areas such as CIS Benchmarks.
Some Infrastructure maintainers may simply check the CIS Benchmark box with v1.23 on a K8s v1.25 install and move to the next task.
My reasons for using RKE2 goes beyond checking boxes however, and I would like to keep up with the correct/current CIS Benchmark using open source products.
The text was updated successfully, but these errors were encountered: