Skip to content

Latest commit

 

History

History

stable

Policies -- Stable

Policies in this folder are supported by Red Hat Advanced Cluster Management for Kubernetes and organized by NIST Special Publication 800-53. NIST SP 800-53 Rev 4 also includes mapping to the ISO/IEC 27001 controls. For more information, read Appendix H in NIST.SP.800-53r4.

Security control catalog

Access Control

Policy Description Prerequisites
policy-limitclusteradmin Limit the number of cluster administrator Openshift users
policy-role Ensure a role exists with permissions as specified
policy-rolebinding Ensure an entity is bound to a particular role

Awareness and Training

Policy Description Prerequisites
No policies yet

Audit and Accountability

Policy Description Prerequisites
No policies yet

Security Assessment and Authorization

Policy Description Prerequisites
Install Red Hat Compliance Operator policy Use the official and supported compliance operator installation, policy-comp-operator policy, to enable continuous compliance monitoring for your cluster. After you install this operator, you must select what benchmark you want to comply to, and create the appropriate objects for the scans to be run. See Compliance Operator for more details.

Configuration Management

Policy Description Prerequisites
Scan your cluster with the E8 (Essential 8) security profile This example creates a ScanSettingBinding that the ComplianceOperator uses to scan the cluster for compliance with the E8 benchmark. See the Compliance Operator repo to learn more about the operator. Note: Compliance operator must be installed to use this policy. See the Compliance operator policy.
policy-etcdencryption Use an encryption policy to encrypt sensitive resources such as Secrets, ConfigMaps, Routes and OAuth access tokens in your cluster. See the OpenShift Documentation to learn how to enable ETCD encryption post install.
policy-limitmemory Ensure resource limits are in place as specified
policy-namespace Ensure a namespace exists as specified
policy-pod Ensure a pod exists as specified

Contingency Planning

Policy Description Prerequisites
No policies yet

Identification and Authentication

Policy Description Prerequisites
No policies yet

Incident Response

Policy Description Prerequisites
No policies yet

Maintenance

Policy Description Prerequisites
No policies yet

Media Protection

Policy Description Prerequisites
No policies yet

Physical and Environmental Protection

Policy Description Prerequisites
No policies yet

Planning

Policy Description Prerequisites
No policies yet

Personnel Security

Policy Description Prerequisites
No policies yet

Risk Assessment

Policy Description Prerequisites
No policies yet

System and Services Acquisition

Policy Description Prerequisites
No policies yet

System and Communications Protection

Policy Description Prerequisites
policy-certificate Ensure certificates are not expiring within a given minimum timeframe

System and Information Integrity

Policy Description Prerequisites
policy-imagemanifestvuln Detect vulnerabilities in container images. Leverages the Container Security Operator and installs it on the managed cluster if not already present.
policy-psp Ensure a Pod Security Policy exists as specified
policy-scc Ensure a Security Context Constraint exists as specified