STIG-A-View
STIG ID | Version | Title | Product |
---|---|---|---|
CNTR-K8-001400 | V2R4 | The Kubernetes API server must use approved cipher suites. | |
CNTR-K8-001410 | V2R4 | Kubernetes API Server must have the SSL Certificate Authority set. | |
CNTR-K8-001420 | V2R4 | Kubernetes Kubelet must have the SSL Certificate Authority set. | |
CNTR-K8-001430 | V2R4 | Kubernetes Controller Manager must have the SSL Certificate Authority set. | |
CNTR-K8-001440 | V2R4 | Kubernetes API Server must have a certificate for communication. | |
CNTR-K8-001450 | V2R4 | Kubernetes etcd must enable client authentication to secure service. | |
CNTR-K8-001460 | V2R4 | Kubernetes Kubelet must enable tlsPrivateKeyFile for client authentication to secure service. | |
CNTR-K8-001470 | V2R4 | Kubernetes Kubelet must enable tlsCertFile for client authentication to secure service. | |
CNTR-K8-001480 | V2R4 | Kubernetes etcd must enable client authentication to secure service. | |
CNTR-K8-001490 | V2R4 | Kubernetes etcd must have a key file for secure communication. | |
CNTR-K8-001500 | V2R4 | Kubernetes etcd must have a certificate for communication. | |
CNTR-K8-001510 | V2R4 | Kubernetes etcd must have the SSL Certificate Authority set. | |
CNTR-K8-001520 | V2R4 | Kubernetes etcd must have a certificate for communication. | |
CNTR-K8-001530 | V2R4 | Kubernetes etcd must have a key file for secure communication. | |
CNTR-K8-001540 | V2R4 | Kubernetes etcd must have peer-cert-file set for secure communication. | |
CNTR-K8-001550 | V2R4 | Kubernetes etcd must have a peer-key-file set for secure communication. | |
CNTR-OS-000510 | V1R1 | OpenShift must protect authenticity of communications sessions with the use of FIPS-validated 140-2 or 140-3 validated cryptography. |