

In addition Orca can also look in all your Kubernetes hosts and containers for sensitive data and malware and has the ability to look at host and container images both in development and in production environments. Orca also has the ability to do PoLP (Principle of Least Privilege) analysis on all Kubernetes permissions as well as look at IAM risk in Kubernetes in a variety of different ways to include looking for lateral movement risk.
#Cis benchmark controls full#
Orca helps because it supports all of the CIS policies needed to protect Kubernetes and is also capable of scanning your all Kubernetes nodes and containers for vulnerabilities.īeyond full support for all the relevant CIS Benchmarks and the ability to scan containers and all hosts for vulnerabilities. Several of the encryption related CIS controls in the Orca UI How Orca Helps For example in the CIS K8S policy 4.2.13 “Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers” checks the Kubelet config file and checks to see if the TLSCipherSuites parameter is set to a strong cypher. CIS helps substantially by checking to make sure most of the configuration settings around encryption are set properly. Ideally, pods shouldn’t be assigned service accounts granted powerful permissions (listed here)Įncryption best practices are covered in all of the different Kubernetes CIS benchmarks.Minimize distribution of privileged tokens.Whilst each cluster will be different, some general rules that can be applied are: The most common issue is ensuring that only permissions explicitly required for their operation should be used. However, you can’t rely only on CIS policies alone and should have a solution that is able to do things like perform PoLP (Principle of Least Privilege) analysis and look at other types of IAM risk, like lateral movement risk. For example from the CIS K8S policy, section Almost every CIS benchmark has an entire section devoted to IAM best practices and configurations. Many of the IAM risks are covered by the CIS Benchmarks. To use CIS to protect your Kubernetes system, you will need three different CIS Benchmarks: one for Kubernetes, one for the containers you are using in your Kubernetes system, and one for the host operating systems that you are running your master and worker nodes on.Ī Kubernetes service vulnerability detected by Orca (CVE-2021-25741) IAM Risk

ĬIS benchmarks are a set of best-practice cybersecurity standards for a range of IT systems that includes Kubernetes and containers. The best way to apply Kubernetes security best practices is to use Center for Internet Security (CIS) benchmarks to do the heavy lifting of hardening your cloud controls. Security Controls Hardening and Best Practices Reduce IAM risk across the entire Kubernetes cluster.Makes sure you are using encryption(CIS can help with this).Make sure you detect and patch/mitigate the vulnerabilities in all of your Kubernetes components.


