Illumina Innovates with Rancher and Kubernetes
Available as of v2.4.0-alpha1
Rancher can run a security scan to check whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark.
The Center for Internet Security (CIS) is a 501©(3) nonprofit organization, formed in October 2000, with a mission is to “identify, develop, validate, promote, and sustain best practice solutions for cyber defense and build and lead communities to enable an environment of trust in cyberspace”. The organization is headquartered in East Greenbush, New York, with members including large corporations, government agencies, and academic institutions.
CIS Benchmarks are best practices for the secure configuration of a target system. CIS Benchmarks are developed through the generous volunteer efforts of subject matter experts, technology vendors, public and private community members, and the CIS Benchmark Development team.
The Benchmark provides recommendations of two types: Scored and Not Scored. We run tests related to only Scored recommendations.
When Rancher runs a CIS Security Scan on a cluster, it generates a report showing the results of each test, including a summary with the number of passed, skipped and failed tests. The report also includes remediation steps for any failed tests.
To check clusters for CIS Kubernetes Benchmark compliance, the security scan leverages kube-bench, an open-source tool from Aqua Security.
Each scan generates a report can be viewed in the Rancher UI and can be downloaded in CSV format.
To determine which version of the Benchmark to use in the scan, Rancher chooses a version that is appropriate for the cluster’s Kubernetes version. The Benchmark version is included in the generated report.
Each test in the report is identified by its corresponding Scored test in the Benchmark. For example, if a cluster fails test 1.3.6, you can look up the description and rationale for the section 1.3.6 in the Benchmark itself, or in Rancher’s hardening guide for the Kubernetes version that the cluster is using. Recommendations marked as Not Scored in the Benchmark are not included in the report.
Similarly, for information on how to manually audit the test result, you could look up section 1.3.6 in Rancher’s self-assessment guide for the corresponding Kubernetes version.
To run security scans on a cluster and access the generated reports, you must be an Administrator or Cluster Owner.
Rancher can only run security scans on clusters that were created with RKE, which includes custom clusters and clusters that Rancher created in an infrastructure provider such as Amazon EC2 or GCE. Imported clusters and clusters in hosted Kubernetes providers can’t be scanned by Rancher.
The security scan cannot run in a cluster that has Windows nodes.
Result: A report is generated and displayed in the CIS Scans page. To see details of the report, click the report’s name.
Result: The tests will be skipped on the next scan.
To re-run the security scan, go to the top of the page and click Run Scan.
Result: The tests will not be skipped on the next scan.