Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add cis-1.8 assessment page #272

Merged
merged 7 commits into from
Apr 25, 2024
Merged
Show file tree
Hide file tree
Changes from 6 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 0 additions & 3 deletions docs/advanced.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,5 @@
---
title: "Advanced Options / Configuration"
aliases:
- /k3s/latest/en/running/
- /k3s/latest/en/configuration/
---

This section contains advanced information describing the different ways you can run and manage K3s, as well as steps necessary to prepare the host OS for K3s use.
Expand Down
2 changes: 1 addition & 1 deletion docs/security/hardening-guide.md
Original file line number Diff line number Diff line change
Expand Up @@ -852,4 +852,4 @@ For `default` service accounts in the built-in namespaces (`kube-system`, `kube-

## Conclusion

If you have followed this guide, your K3s cluster will be configured to comply with the CIS Kubernetes Benchmark. You can review the [CIS Benchmark Self-Assessment Guide](self-assessment.md) to understand the expectations of each of the benchmark's checks and how you can do the same on your cluster.
If you have followed this guide, your K3s cluster will be configured to comply with the CIS Kubernetes Benchmark. You can review the [CIS 1.8 Self-Assessment Guide](self-assessment-1.8.md) to understand the expectations of each of the benchmark's checks and how you can do the same on your cluster.
11 changes: 9 additions & 2 deletions docs/security/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,14 @@ title: "Security"

This section describes the methodology and means of securing a K3s cluster. It's broken into 2 sections. These guides assume k3s is running with embedded etcd.

The documents below apply to CIS Kubernetes Benchmark v1.23.
First the hardening guide provides a list of security best practices to secure a K3s cluster.

* [Hardening Guide](hardening-guide.md)
* [CIS Benchmark Self-Assessment Guide](self-assessment.md)

Second, is the self assessment to validate a hardened cluster. We currently have two different assessments available:

* [CIS 1.23 Benchmark Self-Assessment Guide](self-assessment-1.23.md), older version of the CIS benchmark

* [CIS 1.8 Benchmark Self-Assessment Guide](self-assessment-1.8.md), newer version of the CIS benchmark


Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: CIS Self Assessment Guide
title: CIS 1.23 Self Assessment Guide
---

### CIS Kubernetes Benchmark v1.23 - K3s with Kubernetes v1.22 to v1.24
Expand Down
Loading
Loading