SV-242412r712592_rule
V-242412
SRG-APP-000142-CTR-000330
CNTR-K8-000940
CAT II
10
Amend any system documentation requiring revision. Update Kubernetes Controller manifest and namespace PPS configuration to comply with PPSM CAL.
Change to the /etc/kubernetes/manifests/ directory on the Kubernetes Master Node. Run the command:
grep kube-scheduler.manifest -I -insecure-port
grep kube-scheduler.manifest -I -secure-port
-edit manifest file:
VIM <Manifest Name:
Review livenessProbe:
HttpGet:
Port:
Review ports:
- containerPort:
hostPort:
- containerPort:
hostPort:
Run Command:
kubectl describe services –all-namespace
Search labels for any controller names spaces.
Port:
Any manifest and namespace PPS or services configuration not in compliance with PPSM CAL is a finding.
Review the information systems documentation and interview the team, gain an understanding of the Controller architecture, and determine applicable PPS. Any PPS in the system documentation not in compliance with the CAL PPSM is a finding. Any PPS not set in the system documentation is a finding.
Review findings against the most recent PPSM CAL:
https://cyber.mil/ppsm/cal/
Verify Controller network boundary with the PPS associated with the Controller for Assurance Categories. Any PPS not in compliance with the CAL Assurance Category requirements is a finding.
V-242412
False
CNTR-K8-000940
Change to the /etc/kubernetes/manifests/ directory on the Kubernetes Master Node. Run the command:
grep kube-scheduler.manifest -I -insecure-port
grep kube-scheduler.manifest -I -secure-port
-edit manifest file:
VIM <Manifest Name:
Review livenessProbe:
HttpGet:
Port:
Review ports:
- containerPort:
hostPort:
- containerPort:
hostPort:
Run Command:
kubectl describe services –all-namespace
Search labels for any controller names spaces.
Port:
Any manifest and namespace PPS or services configuration not in compliance with PPSM CAL is a finding.
Review the information systems documentation and interview the team, gain an understanding of the Controller architecture, and determine applicable PPS. Any PPS in the system documentation not in compliance with the CAL PPSM is a finding. Any PPS not set in the system documentation is a finding.
Review findings against the most recent PPSM CAL:
https://cyber.mil/ppsm/cal/
Verify Controller network boundary with the PPS associated with the Controller for Assurance Categories. Any PPS not in compliance with the CAL Assurance Category requirements is a finding.
M
5376