Tanzu Kubernetes Grid Compliance and Hardening 2.5

STIG Results and Exceptions

Last Updated February 10, 2025

This topic shows default-level STIG (V1R8) scan results for Tanzu Kubernetes Grid (TKG) workload clusters deployed by a standalone management cluster, and describes exception handling that can improve the scan results.

For standard processes to further harden TKG workload clusters, see STIG and NSA/CISA Hardening.

The information in this topic only applies to Tanzu Kubernetes Grid with standalone management clusters. If you are using TKGS with vSphere Supervisor (formerly known as vSphere with Tanzu), see the vSphere with Tanzu STIG Hardening Reports.

Hardening Class-Based Workload Clusters

STIG scan results for class-based workload clusters deployed without the additional Kubernetes or OS hardening described in Hardening Class-Based Workload Clusters.

Default Photon OS 5 STIG Exceptions

Photon OS 5 Scan Results:

Default STIG photon scan counts

STIG Exceptions documentation and compensating controls for Photon OS 5 in class-based TKG clusters:

STIG IDDescriptionReasonWorkaround
PHTN-50-000005The Photon operating system must display the Standard Mandatory DOD Notice and Consent Banner before granting local or remote access to the system.Not applicableEnable with run_sshd_banner and run_etc_issue_dod options
PHTN-50-000013The Photon operating system must have the OpenSSL FIPS provider installed to protect the confidentiality of remote access sessions.Photon FIPS is not enabled by default.Enable with run_openssl_fips_install and run_openssl_fips options
PHTN-50-000046The Photon operating system must require authentication upon booting into single-user and maintenance modes.Not recommendedEnable with run_grub_boot_password option
PHTN-50-000111The Photon operating system must off-load audit records onto a different system or media from the system being audited.Real-time logs offload is provided by the fluentbit package.Install and configure fluentbit package
PHTN-50-000121The Photon operating system must be configured to synchronize with an authoritative DOD time source.NTP servers must be configured separatelyFollow the instructions on this KB article
PHTN-50-000182The Photon operating system must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.Photon FIPS is not enabled by default.Enable with run_fips_boot_enable option
PHTN-50-000231The Photon operating system must not perform IPv4 packet forwarding.Not applicableIPv4 forwarding is required for TKG components
PHTN-50-000237The Photon operating system must configure AIDE to detect changes to baseline configurations.AIDE is not enabled by defaultEnable with run_aide_config option

Default Ubuntu 2x.04 STIG Exceptions

Ubuntu OS 2x.04 Scan Results:

Default STIG OS scan counts

STIG Exceptions documentation and compensating controls for Ubuntu OS 2x.04 in class-based TKG clusters:

STIG IDSTIG DescriptionReasonWorkaround
V-238197The Ubuntu operating system must enable the graphical user logon banner to display the Standard Mandatory DoD Notice and Consent Banner before granting local access to the system via a graphical user logon.GUI is NOT installed on TKGNot applicable
V-238198The Ubuntu operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting local access to the system via a graphical user logon.GUI is NOT installed on TKGNot applicable
V-238199The Ubuntu operating system must retain a user’s session lock until that user reestablishes access using established identification and authentication procedures.GUI is NOT installed on TKGNot applicable
V-238201The Ubuntu operating system must map the authenticated identity to the user or group account for PKI-based authentication.ClusterAPI VM does not support pam-pkcs11 for authenticationNot applicable
V-238229The Ubuntu operating system, for PKI-based authentication, must validate certificates by constructing a certification pathClusterAPI VM does not support pam-pkcs11 for authenticationNot applicable
V-238232The Ubuntu operating system must electronically verify Personal Identity Verification (PIV) credentials.ClusterAPI VM does not support pam-pkcs11 for authenticationNot applicable
V-238233The Ubuntu operating system for PKI-based authentication, must implement a local cache of revocation data in case of the inability to access revocation information via the network.ClusterAPI VM does not support pam-pkcs11 for authenticationNot applicable
V-238306The Ubuntu operating system audit event multiplexor must be configured to off-load audit logs onto a different system or storage media from the system being audited.Real-time logs offload is provided by the fluentbit package.Install and configure fluentbit package
V-238307The Ubuntu operating system must immediately notify the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of the repository maximum audit record storage capacity.TKG does not support remote email integration by defaultInstall prometheus and configure prometheus alerting
V-238321The Ubuntu operating system must have a crontab script running weekly to offload audit events of standalone systems.Real-time logs offload is provided by the fluentbit package.Install and configure fluentbit package
V-238331The Ubuntu operating system must automatically expire temporary accounts within 72 hours.Emergency accounts are not supported and should not exist on TKG since the box is immutable. Capv is an infrequently used account.Not applicable
V-238335Ubuntu operating systems handling data requiring ???data at rest??? protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.ClusterAPI VM does not support disk encryptionFS must encrypted on VSAN
V-238336The Ubuntu operating system must deploy Endpoint Security for Linux Threat Prevention (ENSLTP).TKG does not support the installation of third party licensed McAffee softwareNot applicable
V-238356The Ubuntu operating system must, for networked systems, compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).NTP servers must be configured separatelyFollow the instructions on this KB article
V-238361The Ubuntu operating system must allow the use of a temporary password for system logons with an immediate change to a permanent password.Password is not supported on TKG, access is made via SSH and keys installed via CAPI.Not applicable
V-238362The Ubuntu operating system must be configured such that Pluggable Authentication Module (PAM) prohibits the use of cached authentications after one day.This requires smart card authentication. TKG does not support this setup.Not applicable
V-238365Ubuntu operating system must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest.ClusterAPI VM does not support disk encryptionFS must encrypted on VSAN
V-238366Ubuntu operating system must implement cryptographic mechanisms to prevent unauthorized disclosure of all information at rest.ClusterAPI VM does not support disk encryptionFS must encrypted on VSAN
V-238367The Ubuntu operating system must configure the uncomplicated firewall to rate-limit impacted network interfaces.Rate Limit for NIC is configured using UFW, this firewall is inactive on TKG and not supported.Not applicable
V-238379The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.GUI is NOT installed on TKGNot applicable

STIG Exceptions with BYOI OS Hardening

STIG exceptions for Ubuntu OS 2x.04 in class-based TKG clusters with custom (Bring Your Own Image) hardened OVA, created by running Image Builder with the ansible_user_vars settings for STIG hardening described in Build a Linux Image:

STIG IDSTIG DescriptionReasonWorkaround
V-238214The Ubuntu operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting any local or remote connection to the system.The DoD SSH banner is not installed by default, but a workaround presents a way to enable it.Must recreate the node with install_sshd_login_banner=true enabled.
V-238216The Ubuntu operating system must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-2Ubuntu FIPS is not supported.Not supported.
V-238217The Ubuntu operating system must configure the SSH daemon to use FIPS-140-2 approved ciphersUbuntu FIPS is not supported.Not supported.
V-238236The Ubuntu operating system must be configured so that the script which runs each 30 days or less to check file integrity is the default one.AIDE is not installed or enabled by defaultMust recreate the node with install_aide=true enabled and copy the example script: sudo cp -f /usr/share/aide/config/cron.daily/aide /etc/cron.daily/aide
V-238303The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools.AIDE is not installed or enabled by defaultMust recreate the node with install_aide=true enabled.
V-238358The Ubuntu operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner.AIDE is not installed or enabled by defaultMust recreate the node with install_aide=true enabled.
V-238363The Ubuntu operating system must implement NIST FIPS-validatedAIDE is not installed or enabled by defaultMust recreate the node with install_aide=true enabled.
V-238364The Ubuntu operating system must use DoD PKI-established certificate authorities for verification of the establishment of protected sessions.DoD Certificate Authority chain is not installed by defaultCustomers running on a DoD network must install the CA chain, and recreate the node with remove_existing_ca_certs=true
V-238371The Ubuntu operating system must use a file integrity tool to verify correct operation of all security functions.AIDE is not installed or enabled by defaultMust recreate the node with install_aide=true enabled.
V-238372The Ubuntu operating system must notify designated personnel if baseline configurations are changed in an unauthorized mannerAIDE is not installed or enabled by defaultMust recreate the node with install_aide=true enabled.

STIG Exceptions with Kubernetes Hardening

Kubernetes Scan Results:

Control plane nodes:

Default STIG Kubernetes scan counts, control plane

Worker nodes:

Default STIG Kubernetes scan counts, control plane

STIG exceptions for Kubernetes in class-based TKG clusters with Kubernetes hardened using the configuration file variable settings listed in STIG Hardening:

STIG IDSTIG DescriptionReasonWorkaround
V-242376The Kubernetes Controller Manager must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination. This can be resolved by setting SECURITY_MINIMUM_TLS_PROTOCOL. Valid values tls_1.2 or tls_1.3.
V-242377The Kubernetes Scheduler must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination. This can be resolved by setting SECURITY_MINIMUM_TLS_PROTOCOL. Valid values tls_1.2 or tls_1.3.
V-242378The Kubernetes API Server must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination. This can be resolved by setting SECURITY_MINIMUM_TLS_PROTOCOL. Valid values tls_1.2 or tls_1.3.
V-242390The Kubernetes API server must have anonymous authentication disabled. This can be resolved by setting APISERVER_EXTRA_ARGS.
V-242403Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event. This can be resolved by setting ENABLE_AUDIT_LOGGING: true
V-242409Kubernetes Controller Manager must disable profiling. This is set by default. To manually override this default set KUBE_CONTROLLER_MANAGER_EXTRA_ARGS
V-242414The Kubernetes cluster must use non-privileged host ports for user pods.The vmware-system and tkg-system namespace are special namespaces with static ports required for system functioning.Firewall or Network Policies may be used to limit traffic for these services.
V-242415Secrets in Kubernetes must not be stored as environment variables.AVI (TKG default load balancer) by default manages its secret for its CA in an environment variable.There are not workarounds for this at the moment.
V-242418The Kubernetes API server must use approved cipher suites. This can be resolved by setting APISERVER_EXTRA_ARGS.
V-242425Kubernetes Kubelet must enable tls-cert-file for client authentication to secure service. RotateServerCertificates requires serving certificates to be manually approved. The user can manually enable this, approve the certificates, and then apply this setting to the kubelets.
V-242434Kubernetes Kubelet must enable kernel protection. This can be resolved by setting the worker node and control plane KUBELET_EXTRA_ARGS.
V-242445The Kubernetes component etcd must be owned by etcd. To provision clusters, Tanzu Kubernetes Grid uses Cluster API which, in turn, uses the kubeadm tool to provision Kubernetes. kubeadm makes etcd run containerized as a static pod, therefore the directory does not need to be set to a particular user.
V-242468The Kubernetes API Server must prohibit communication using TLS version 1.0 and 1.1, and SSL 2.0 and 3.0. This can be resolved by setting APISERVER_EXTRA_ARGS
V-254800Kubernetes must have a Pod Security Admission control file configured. OPA Gatekeeper is a viable alternative and allows for finer grained pod security.

Hardening Plan-Based (Legacy) Workload Clusters

STIG scan results for plan-based (legacy) TKG workload clusters hardened as described in Hardening Plan-Based Workload Clusters are:

  • Control Plane

    OOTB Control Plane

  • Worker Nodes

    OOTB Worker

STIG Results and Exceptions for Plan-Based Cluster Control Plane

VIDFinding TitleCompliant by default?Can be Resolved?Explanation/Exception
V-242376The Kubernetes Controller Manager must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination.NoYesThis can be resolved with a ytt overlay
V-242377The Kubernetes Scheduler must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination.NoYesThis can be resolved with a ytt overlay
V-242378The Kubernetes API server must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination.NoYesThis can be resolved with a ytt overlay
V-242379The Kubernetes etcd must use TLS to protect the confidentiality of sensitive data during electronic dissemination.NoYesThis can be resolved with a ytt overlay
V-242380The Kubernetes etcd must use TLS to protect the confidentiality of sensitive data during electronic dissemination.Yes
V-242381The Kubernetes Controller Manager must create unique service accounts for each work payload.Yes
V-242382The Kubernetes API server must enable Node,RBAC as the authorization mode.Yes
V-242383User-managed resources must be created in dedicated namespaces.Yes
V-242384The Kubernetes Scheduler must have secure binding.Yes
V-242385The Kubernetes Controller Manager must have secure binding.Yes
V-242386The Kubernetes API server must have the insecure port flag disabled.NoNoException --insecure-port flag has been removed in Kubernetes v1.24+
V-242387The Kubernetes Kubelet must have the read-only port flag disabled.Yes
V-242388The Kubernetes API server must have the insecure bind address not set.Yes
V-242389The Kubernetes API server must have the secure port set.Yes
V-242390The Kubernetes API server must have anonymous authentication disabled.NoNoException RBAC authorization is enabled on the API server (V-242382), it is generally considered reasonable to allow anonymous access to the API server for health checks and discovery purposes when RBAC is enabled
V-242391The Kubernetes Kubelet must have anonymous authentication disabled.Yes
V-242392The Kubernetes kubelet must enable explicit authorization.Yes
V-242393Kubernetes Worker Nodes must not have sshd service running.Yes
V-242394Kubernetes Worker Nodes must not have the sshd service enabled.NoNoException ssh is restricted to only the bastion server and is needed to enable serving certificates and install monitoring tools. Also this is not a worker node
V-242395Kubernetes dashboard must not be enabled.Yes
V-242396Kubernetes Kubectl cp command must give expected access and results.Yes
V-242397The Kubernetes kubelet static PodPath must not enable static pods.NoNoException TKG utilizes the staticPodPath to launch numerous components so it can not be disabled
V-242398Kubernetes DynamicAuditing must not be enabled.Yes
V-242399Kubernetes DynamicKubeletConfig must not be enabled.Yes
V-242400The Kubernetes API server must have Alpha APIs disabled.Yes
V-242401The Kubernetes API server must have an audit policy set.Yes
V-242402The Kubernetes API server must have an audit log path set.Yes
V-242403Kubernetes API server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.Yes
V-242403Kubernetes API server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.Yes
V-242403Kubernetes API server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.Yes
V-242403Kubernetes API server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.Yes
V-242403Kubernetes API server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.Yes
V-242403Kubernetes API server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event.Yes
V-242404Kubernetes Kubelet must deny hostname override.NoNoException This is needed for public cloud Kubernetes clusters.
V-242405The Kubernetes manifests must be owned by root.Yes
V-242406The Kubernetes kubelet configuration file must be owned by root.Yes
V-242407The Kubernetes kubelet configuration file must be owned by root.Yes
V-242408The Kubernetes manifests must have least privileges.Yes
V-242409Kubernetes Controller Manager must disable profiling.NoYesThis can be resolved with a ytt overlay
V-242410The Kubernetes API server must enforce ports, protocols, and services(PPS) that adhere to the Ports, Protocols, and Services Management CategoryAssurance List (PPSM CAL).NoNoException Manual Review - Handled by PPSM monitoring solution
V-242411The Kubernetes Scheduler must enforce ports, protocols, and services(PPS) that adhere to the Ports, Protocols, and Services Management CategoryAssurance List (PPSM CAL).NoNoException Manual Review - Handled by PPSM monitoring solution
V-242412The Kubernetes Controllers must enforce ports, protocols, and services(PPS) that adhere to the Ports, Protocols, and Services Management CategoryAssurance List (PPSM CAL).NoNoException Manual Review - Handled by PPSM monitoring solution
V-242413The Kubernetes etcd must enforce ports, protocols, and services (PPS)that adhere to the Ports, Protocols, and Services Management Category AssuranceList (PPSM CAL).NoNoException Manual Review - Handled by PPSM monitoring solution
V-242414The Kubernetes cluster must use non-privileged host ports for user pods.NoNoException Manual Review - Handled by PPSM monitoring solution
V-242415Secrets in Kubernetes must not be stored as environment variables.Yes
V-242416Kubernetes Kubelet must not disable timeouts.NoYesThis can be resolved with a ytt overlay
V-242417Kubernetes must separate user functionality.NoNoException Manual Review
V-242418The Kubernetes API server must use approved cipher suites.Yes
V-242419Kubernetes API server must have the SSL Certificate Authority set.Yes
V-242420Kubernetes Kubelet must have the SSL Certificate Authority set.Yes
V-242421Kubernetes Controller Manager must have the SSL Certificate Authority set.Yes
V-242422Kubernetes API server must have a certificate for communication.Yes
V-242423Kubernetes etcd must enable client authentication to secure service.Yes
V-242424Kubernetes Kubelet must enable tls-private-key-file for client authentication to secure service.NoYesThis can be enabled manually after the feature gate for the controller manager and kubelet, RotateServerCertificates, is added to the overlay along with the client-ca-file defined in the kubelet and the kubelet-certificate-authority defined in the api-server. Once the cluster starts with the aforementioned enabled the certificates can be manually approved as kubelet-serving certificates are not auto approved and then the kubelet configs can be modified to include tls-private-key-file and tls-cert-file both pointing at the newly create kubelet-server-current.pem file. Then simply restart the kubelet
V-242425Kubernetes Kubelet must enable tls-cert-file for client authentication to secure service.NoYesThis can be enabled manually after the feature gate for the controller manager and kubelet, RotateServerCertificates, is added to the overlay along with the client-ca-file defined in the kubelet and the kubelet-certificate-authority defined in the api-server. Once the cluster starts with the aforementioned enabled the certificates can be manually approved as kubelet-serving certificates are not auto approved and then the kubelet configs can be modified to include tls-private-key-file and tls-cert-file both pointing at the newly create kubelet-server-current.pem file. Then simply restart the kubelet
V-242426Kubernetes etcd must enable client authentication to secure service.Yes
V-242427Kubernetes etcd must have a key file for secure communication.Yes
V-242428Kubernetes etcd must have a certificate for communication.Yes
V-242429Kubernetes etcd must have the SSL Certificate Authority set.Yes
V-242430Kubernetes etcd must have a certificate for communication.Yes
V-242431Kubernetes etcd must have a key file for secure communication.Yes
V-242432Kubernetes etcd must have peer-cert-file set for secure communication.Yes
V-242433Kubernetes etcd must have a peer-key-file set for secure communication.Yes
V-242434Kubernetes Kubelet must enable kernel protection.NoYesThis can be resolved after creating either a custom AMI or setting up the host’s properly ahead of time and then enabling it via a ytt overlay
V-242435Kubernetes must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures or the installation of patches and updates.Yes
V-242435Kubernetes must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures or the installation of patches and updates.Yes
V-242435Kubernetes must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures or the installation of patches and updates.Yes
V-242436The Kubernetes API server must have the ValidatingAdmissionWebhook enabled.Yes
V-242437Kubernetes must have a pod security policy set.NoNoException OPA Gatekeeper is the recommended solution for Pod Security after the deprecation of Pod Security Policies
V-242438Kubernetes API server must configure timeouts to limit attack surface.Yes
V-242439Kubernetes API server must disable basic authentication to protect information in transit.Yes
V-242440Kubernetes API server must disable token authentication to protect information in transit.Yes
V-242441Kubernetes endpoints must use approved organizational certificate and key pair to protect information in transit.Yes
V-242442Kubernetes must remove old components after updated versions have been installed.NoNoException Manual Review
V-242443Kubernetes must contain the latest updates as authorized by IAVMs,CTOs, DTMs, and STIGs.Yes
V-242444The Kubernetes component manifests must be owned by root.Yes
V-242445The Kubernetes component etcd must be owned by etcd.NoNoException The data directory (/var/lib/etcd) is owned by root:root.To provision clusters, Tanzu Kubernetes Grid uses Cluster API which, in turn, uses the kubeadm tool to provision Kubernetes. kubeadm makes etcd run containerized as a static pod, therefore the directory does not need to be set to a particular user. kubeadm configures the directory to not be readable by non-root users.
V-242446The Kubernetes conf files must be owned by root.Yes
V-242447The Kubernetes Kube Proxy must have file permissions set to 644 or more restrictive.NoNoException Kubeconfig for kube-proxy is a symlink. The base file is 0644 or less permissive. Manual Review
V-242448The Kubernetes Kube Proxy must be owned by root.Yes
V-242449The Kubernetes Kubelet certificate authority file must have file permissions set to 644 or more restrictive.Yes
V-242450The Kubernetes Kubelet certificate authority must be owned by root.Yes
V-242451The Kubernetes component PKI must be owned by root.Yes
V-242452The Kubernetes kubelet config must have file permissions set to 644 or more restrictive.Yes
V-242453The Kubernetes kubelet config must be owned by root.Yes
V-242454The Kubernetes kubeadm must be owned by root.Yes
V-242455The Kubernetes kubelet service must have file permissions set to 644 or more restrictive.Yes
V-242456The Kubernetes kubelet config must have file permissions set to 644 or more restrictive.Yes
V-242457The Kubernetes kubelet config must be owned by root.Yes
V-242458The Kubernetes API server must have file permissions set to 644 or more restrictive.Yes
V-242459The Kubernetes etcd must have file permissions set to 644 or more restrictive.Yes
V-242460The Kubernetes admin.conf must have file permissions set to 644 or more restrictive.Yes
V-242461Kubernetes API server audit logs must be enabled.Yes
V-242462The Kubernetes API server must be set to audit log max size.Yes
V-242463The Kubernetes API server must be set to audit log maximum backup.Yes
V-242464The Kubernetes API server audit log retention must be set.Yes
V-242465The Kubernetes API server audit log path must be set.Yes
V-242466The Kubernetes PKI CRT must have file permissions set to 644 or more restrictive.Yes
V-242467The Kubernetes PKI keys must have file permissions set to 600 or more restrictive.Yes
V-242468The Kubernetes API server must prohibit communication using TLS version 1.0 and 1.1, and SSL 2.0 and 3.0.NoYesThis can be resolved with a ytt overlay

STIG Results and Exceptions for Plan-Based Cluster Workers

VIDFinding TitleCompliant by default?Can be Resolved?Explanation/Exception
V-242387The Kubernetes Kubelet must have the read-only port flag disabled.Yes
V-242391The Kubernetes Kubelet must have anonymous authentication disabled.Yes
V-242392The Kubernetes kubelet must enable explicit authorization.Yes
V-242393Kubernetes Worker Nodes must not have sshd service running.Yes
V-242394Kubernetes Worker Nodes must not have the sshd service enabled.NoNoException ssh is restricted to only the bastion server and is needed to enable serving certificates and install monitoring tools
V-242396Kubernetes Kubectl cp command must give expected access and results.Yes
V-242397The Kubernetes kubelet static PodPath must not enable static pods.NoNoException staticPodPath is needed for TKG to install properly as several of the pods in the tkg-system are defined there
V-242398Kubernetes DynamicAuditing must not be enabled.Yes
V-242399Kubernetes DynamicKubeletConfig must not be enabled.Yes
V-242400The Kubernetes API server must have Alpha APIs disabled.Yes
V-242404Kubernetes Kubelet must deny hostname override.NoNoException hostname-override is needed for public cloud deployments of Kubernetes
V-242406The Kubernetes kubelet configuration file must be owned by root.Yes
V-242407The Kubernetes kubelet configuration file must be owned by root.Yes
V-242416Kubernetes Kubelet must not disable timeouts.NoYesThis can be resolved with a ytt overlay
V-242420Kubernetes Kubelet must have the SSL Certificate Authority set.Yes
V-242425Kubernetes Kubelet must enable tls-cert-file for client authentication to secure service.NoYesThis can be enabled manually after the feature gate for the controller manager and kubelet, RotateServerCertificates, is added to the overlay along with the client-ca-file defined in the kubelet and the kubelet-certificate-authority defined in the api-server. Once the cluster starts with the aforementioned enabled the certificates can be manually approved as kubelet-serving certificates are not auto approved and then the kubelet configs can be modified to include tls-private-key-file and tls-cert-file both pointing at the newly create kubelet-server-current.pem file. Then simply restart the kubelet
V-242434Kubernetes Kubelet must enable kernel protection.NoYesThis can be resolved after creating either a custom AMI or setting up the host’s properly ahead of time and then enabling it via a ytt overlay
V-242449The Kubernetes Kubelet certificate authority file must have file permissions set to 644 or more restrictive.Yes
V-242450The Kubernetes Kubelet certificate authority must be owned by root.Yes
V-242451The Kubernetes component PKI must be owned by root.Yes
V-242452The Kubernetes kubelet config must have file permissions set to 644 or more restrictive.Yes
V-242453The Kubernetes kubelet config must be owned by root.Yes
V-242454The Kubernetes kubeadm must be owned by root.Yes
V-242455The Kubernetes kubelet service must have file permissions set to 644 or more restrictive.Yes
V-242456The Kubernetes kubelet config must have file permissions set to 644 or more restrictive.Yes
V-242457The Kubernetes kubelet config must be owned by root.Yes
V-242466The Kubernetes PKI CRT must have file permissions set to 644 or more restrictive.Yes