-
Notifications
You must be signed in to change notification settings - Fork 718
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
release by forward-port rancher-cis-benchmark 6.1.0
- Loading branch information
1 parent
8fc8445
commit e14339c
Showing
51 changed files
with
898 additions
and
0 deletions.
There are no files selected for viewing
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
annotations: | ||
catalog.cattle.io/auto-install: rancher-cis-benchmark-crd=match | ||
catalog.cattle.io/certified: rancher | ||
catalog.cattle.io/display-name: CIS Benchmark | ||
catalog.cattle.io/kube-version: '>= 1.27.0-0 < 1.31.0-0' | ||
catalog.cattle.io/namespace: cis-operator-system | ||
catalog.cattle.io/os: linux | ||
catalog.cattle.io/permits-os: linux,windows | ||
catalog.cattle.io/provides-gvr: cis.cattle.io.clusterscans/v1 | ||
catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.10.0-0' | ||
catalog.cattle.io/release-name: rancher-cis-benchmark | ||
catalog.cattle.io/type: cluster-tool | ||
catalog.cattle.io/ui-component: rancher-cis-benchmark | ||
apiVersion: v1 | ||
appVersion: v6.1.0 | ||
description: The cis-operator enables running CIS benchmark security scans on a kubernetes | ||
cluster | ||
icon: https://charts.rancher.io/assets/logos/cis-kube-bench.svg | ||
keywords: | ||
- security | ||
name: rancher-cis-benchmark | ||
version: 6.1.0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
# Rancher CIS Benchmark Chart | ||
|
||
The cis-operator enables running CIS benchmark security scans on a kubernetes cluster and generate compliance reports that can be downloaded. | ||
|
||
# Installation | ||
|
||
``` | ||
helm install rancher-cis-benchmark ./ --create-namespace -n cis-operator-system | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
# Rancher CIS Benchmarks | ||
|
||
This chart enables security scanning of the cluster using [CIS (Center for Internet Security) benchmarks](https://www.cisecurity.org/benchmark/kubernetes/). | ||
|
||
For more information on how to use the feature, refer to our [docs](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/cis-scan-guides). | ||
|
||
This chart installs the following components: | ||
|
||
- [cis-operator](https://github.com/rancher/cis-operator) - The cis-operator handles launching the [kube-bench](https://github.com/aquasecurity/kube-bench) tool that runs a suite of CIS tests on the nodes of your Kubernetes cluster. After scans finish, the cis-operator generates a compliance report that can be downloaded. | ||
- Scans - A scan is a CRD (`ClusterScan`) that defines when to trigger CIS scans on the cluster based on the defined profile. A report is created after the scan is completed. | ||
- Profiles - A profile is a CRD (`ClusterScanProfile`) that defines the configuration for the CIS scan, which is the benchmark versions to use and any specific tests to skip in that benchmark. This chart installs a few default `ClusterScanProfile` custom resources with no skipped tests, which can immediately be used to launch CIS scans. | ||
- Benchmark Versions - A benchmark version is a CRD (`ClusterScanBenchmark`) that defines the CIS benchmark version to run using kube-bench as well as the valid configuration parameters for that benchmark. This chart installs a few default `ClusterScanBenchmark` custom resources. | ||
- Alerting Resources - Rancher's CIS Benchmark application lets you run a cluster scan on a schedule, and send alerts when scans finish. | ||
- If you want to enable alerts to be delivered when a cluster scan completes, you need to ensure that [Rancher's Monitoring and Alerting](https://rancher.com/docs/rancher/v2.x/en/monitoring-alerting/v2.5/) application is pre-installed and the [Receivers and Routes](https://rancher.com/docs/rancher/v2.x/en/monitoring-alerting/v2.5/configuration/#alertmanager-config) are configured to send out alerts. | ||
- Additionally, you need to set `alerts: true` in the Values YAML while installing or upgrading this chart. | ||
|
||
## CIS Kubernetes Benchmark support | ||
|
||
| Source | Kubernetes distribution | scan profile | Kubernetes versions | | ||
|--------|-------------------------|--------------------------------------------------------------------------------------------------------------------|---------------------| | ||
| CIS | any | [cis-1.7](https://github.com/rancher/security-scan/tree/master/package/cfg/cis-1.7) | v1.25 | | ||
| CIS | any | [cis-1.8](https://github.com/rancher/security-scan/tree/master/package/cfg/cis-1.8) | v1.26+ | | ||
| CIS | rke | [rke-cis-1.7-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/rke-cis-1.7-permissive) | rke1-v1.25 | | ||
| CIS | rke | [rke-cis-1.7-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/rke-cis-1.7-hardened) | rke1-v1.25 | | ||
| CIS | rke | [rke-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/rke-cis-1.8-permissive) | rke1-v1.26+ | | ||
| CIS | rke | [rke-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/rke-cis-1.8-hardened) | rke1-v1.26+ | | ||
| CIS | rke2 | [rke2-cis-1.7-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/rke2-cis-1.7-permissive)| rke2-v1.25 | | ||
| CIS | rke2 | [rke2-cis-1.7-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/rke2-cis-1.7-hardened) | rke2-v1.25 | | ||
| CIS | rke2 | [rke2-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/rke2-cis-1.8-permissive)| rke2-v1.26+ | | ||
| CIS | rke2 | [rke2-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/rke2-cis-1.8-hardened) | rke2-v1.26+ | | ||
| CIS | k3s | [k3s-cis-1.7-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/k3s-cis-1.7-permissive) | k3s-v1.25 | | ||
| CIS | k3s | [k3s-cis-1.7-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/k3s-cis-1.7-hardened) | k3s-v1.25 | | ||
| CIS | k3s | [k3s-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/k3s-cis-1.8-permissive) | k3s-v1.26+ | | ||
| CIS | k3s | [k3s-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/k3s-cis-1.8-hardened) | k3s-v1.26+ | | ||
| CIS | eks | eks-1.2.0 | eks | | ||
| CIS | aks | aks-1.0 | aks | | ||
| CIS | gke | gke-1.2.0 | gke | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
{{/* Ensure namespace is set the same everywhere */}} | ||
{{- define "cis.namespace" -}} | ||
{{- .Release.Namespace | default "cis-operator-system" -}} | ||
{{- end -}} | ||
|
||
{{- define "system_default_registry" -}} | ||
{{- if .Values.global.cattle.systemDefaultRegistry -}} | ||
{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} | ||
{{- else -}} | ||
{{- "" -}} | ||
{{- end -}} | ||
{{- end -}} | ||
|
||
{{/* | ||
Windows cluster will add default taint for linux nodes, | ||
add below linux tolerations to workloads could be scheduled to those linux nodes | ||
*/}} | ||
{{- define "linux-node-tolerations" -}} | ||
- key: "cattle.io/os" | ||
value: "linux" | ||
effect: "NoSchedule" | ||
operator: "Equal" | ||
{{- end -}} | ||
|
||
{{- define "linux-node-selector" -}} | ||
kubernetes.io/os: linux | ||
{{- end -}} |
14 changes: 14 additions & 0 deletions
14
charts/rancher-cis-benchmark/6.1.0/templates/alertingrule.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
{{- if .Values.alerts.enabled -}} | ||
--- | ||
apiVersion: monitoring.coreos.com/v1 | ||
kind: PodMonitor | ||
metadata: | ||
name: rancher-cis-pod-monitor | ||
namespace: {{ template "cis.namespace" . }} | ||
spec: | ||
selector: | ||
matchLabels: | ||
cis.cattle.io/operator: cis-operator | ||
podMetricsEndpoints: | ||
- port: cismetrics | ||
{{- end }} |
8 changes: 8 additions & 0 deletions
8
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-aks-1.0.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: aks-1.0 | ||
spec: | ||
clusterProvider: aks | ||
minKubernetesVersion: "1.15.0" |
9 changes: 9 additions & 0 deletions
9
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-cis-1.7.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: cis-1.7 | ||
spec: | ||
clusterProvider: "" | ||
minKubernetesVersion: "1.25.0" | ||
maxKubernetesVersion: "1.25.x" |
8 changes: 8 additions & 0 deletions
8
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-cis-1.8.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: cis-1.8 | ||
spec: | ||
clusterProvider: "" | ||
minKubernetesVersion: "1.26.0" |
8 changes: 8 additions & 0 deletions
8
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-eks-1.2.0.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: eks-1.2.0 | ||
spec: | ||
clusterProvider: eks | ||
minKubernetesVersion: "1.15.0" |
8 changes: 8 additions & 0 deletions
8
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-gke-1.2.0.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: gke-1.2.0 | ||
spec: | ||
clusterProvider: gke | ||
minKubernetesVersion: "1.15.0" |
9 changes: 9 additions & 0 deletions
9
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-k3s-cis-1.7-hardened.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: k3s-cis-1.7-hardened | ||
spec: | ||
clusterProvider: k3s | ||
minKubernetesVersion: "1.25.0" | ||
maxKubernetesVersion: "1.25.x" |
9 changes: 9 additions & 0 deletions
9
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-k3s-cis-1.7-permissive.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: k3s-cis-1.7-permissive | ||
spec: | ||
clusterProvider: k3s | ||
minKubernetesVersion: "1.25.0" | ||
maxKubernetesVersion: "1.25.x" |
8 changes: 8 additions & 0 deletions
8
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-k3s-cis-1.8-hardened.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: k3s-cis-1.8-hardened | ||
spec: | ||
clusterProvider: k3s | ||
minKubernetesVersion: "1.26.0" |
8 changes: 8 additions & 0 deletions
8
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-k3s-cis-1.8-permissive.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: k3s-cis-1.8-permissive | ||
spec: | ||
clusterProvider: k3s | ||
minKubernetesVersion: "1.26.0" |
9 changes: 9 additions & 0 deletions
9
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-rke-cis-1.7-hardened.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: rke-cis-1.7-hardened | ||
spec: | ||
clusterProvider: rke | ||
minKubernetesVersion: "1.25.0" | ||
maxKubernetesVersion: "1.25.x" |
9 changes: 9 additions & 0 deletions
9
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-rke-cis-1.7-permissive.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: rke-cis-1.7-permissive | ||
spec: | ||
clusterProvider: rke | ||
minKubernetesVersion: "1.25.0" | ||
maxKubernetesVersion: "1.25.x" |
8 changes: 8 additions & 0 deletions
8
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-rke-cis-1.8-hardened.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: rke-cis-1.8-hardened | ||
spec: | ||
clusterProvider: rke | ||
minKubernetesVersion: "1.26.0" |
8 changes: 8 additions & 0 deletions
8
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-rke-cis-1.8-permissive.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: rke-cis-1.8-permissive | ||
spec: | ||
clusterProvider: rke | ||
minKubernetesVersion: "1.26.0" |
9 changes: 9 additions & 0 deletions
9
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-rke2-cis-1.7-hardened.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: rke2-cis-1.7-hardened | ||
spec: | ||
clusterProvider: rke2 | ||
minKubernetesVersion: "1.25.0" | ||
maxKubernetesVersion: "1.25.x" |
9 changes: 9 additions & 0 deletions
9
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-rke2-cis-1.7-permissive.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: rke2-cis-1.7-permissive | ||
spec: | ||
clusterProvider: rke2 | ||
minKubernetesVersion: "1.25.0" | ||
maxKubernetesVersion: "1.25.x" |
8 changes: 8 additions & 0 deletions
8
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-rke2-cis-1.8-hardened.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: rke2-cis-1.8-hardened | ||
spec: | ||
clusterProvider: rke2 | ||
minKubernetesVersion: "1.26.0" |
8 changes: 8 additions & 0 deletions
8
charts/rancher-cis-benchmark/6.1.0/templates/benchmark-rke2-cis-1.8-permissive.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
--- | ||
apiVersion: cis.cattle.io/v1 | ||
kind: ClusterScanBenchmark | ||
metadata: | ||
name: rke2-cis-1.8-permissive | ||
spec: | ||
clusterProvider: rke2 | ||
minKubernetesVersion: "1.26.0" |
49 changes: 49 additions & 0 deletions
49
charts/rancher-cis-benchmark/6.1.0/templates/cis-roles.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,49 @@ | ||
--- | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: ClusterRole | ||
metadata: | ||
name: cis-admin | ||
rules: | ||
- apiGroups: | ||
- cis.cattle.io | ||
resources: | ||
- clusterscanbenchmarks | ||
- clusterscanprofiles | ||
- clusterscans | ||
- clusterscanreports | ||
verbs: ["create", "update", "delete", "patch","get", "watch", "list"] | ||
- apiGroups: | ||
- catalog.cattle.io | ||
resources: ["apps"] | ||
resourceNames: ["rancher-cis-benchmark"] | ||
verbs: ["get", "watch", "list"] | ||
- apiGroups: | ||
- "" | ||
resources: | ||
- configmaps | ||
verbs: | ||
- '*' | ||
--- | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: ClusterRole | ||
metadata: | ||
name: cis-view | ||
rules: | ||
- apiGroups: | ||
- cis.cattle.io | ||
resources: | ||
- clusterscanbenchmarks | ||
- clusterscanprofiles | ||
- clusterscans | ||
- clusterscanreports | ||
verbs: ["get", "watch", "list"] | ||
- apiGroups: | ||
- catalog.cattle.io | ||
resources: ["apps"] | ||
resourceNames: ["rancher-cis-benchmark"] | ||
verbs: ["get", "watch", "list"] | ||
- apiGroups: | ||
- "" | ||
resources: | ||
- configmaps | ||
verbs: ["get", "watch", "list"] |
18 changes: 18 additions & 0 deletions
18
charts/rancher-cis-benchmark/6.1.0/templates/configmap.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
kind: ConfigMap | ||
apiVersion: v1 | ||
metadata: | ||
name: default-clusterscanprofiles | ||
namespace: {{ template "cis.namespace" . }} | ||
data: | ||
# Default ClusterScanProfiles per cluster provider type | ||
rke: |- | ||
<1.21.0: rke-profile-permissive-1.20 | ||
>=1.21.0: rke-profile-permissive-1.8 | ||
rke2: |- | ||
<1.21.0: rke2-cis-1.20-profile-permissive | ||
>=1.21.0: rke2-cis-1.8-profile-permissive | ||
eks: "eks-profile" | ||
gke: "gke-profile" | ||
aks: "aks-profile" | ||
k3s: "k3s-cis-1.8-profile-permissive" | ||
default: "cis-1.8-profile" |
Oops, something went wrong.