利用Kube-Bench对Kubernetes进行安全检测

打印 上一主题 下一主题

主题 995|帖子 995|积分 2985

利用Kube-Bench对Kubernetes进行安全检测

1. 工具介绍

Kube-Bench是一个开源的Go语言工具,用于主动化查抄Kubernetes集群是否符合CIS Kubernetes基准。这些基准包括一系列关于Kubernetes配置和部署安全性的发起和最佳实践。
Kube-Bench实验了一系列针对Kubernetes组件(如kube-apiserver、etcd、kube-scheduler、kube-controller-manager等)的测试,来查抄它们是否按照CIS基准的推荐进行了配置。测试效果会被分类为PASS、FAIL或WARN,以清楚明白地显示哪些地方必要改进。
Kube-Bench是在运行时查抄Kubernetes环境的工具,它并不会修改系统。你可以定期运行kube-bench来审计你的Kubernetes环境,确保其保持在最佳的安全状态。
官方仓库:https://github.com/aquasecurity/kube-bench
2. CIS Kubernetes Benchmark支持

在Kubernetes环境中,CIS Kubernetes基准就是一套针对Kubernetes的安全配置最佳实践。例如,CIS Kubernetes基准会涵盖如何配置kubelet,如何限制API服务器上的权限等内容。
进入CIS(Center for Internet Security)官网可以下载Kubernetes Benchmark文件。
Kubernetes Benchmark、kube-bench config和Kubernetes配套关系如下:
SourceKubernetes Benchmarkkube-bench configKubernetes versionsCIS1.5.1cis-1.51.15CIS1.6.0cis-1.61.16-1.18CIS1.20cis-1.201.19-1.21CIS1.23cis-1.231.22-1.23CIS1.24cis-1.241.24CIS1.7cis-1.71.25CIS1.8cis-1.81.26CISGKE 1.0.0gke-1.0GKECISGKE 1.2.0gke-1.2.0GKECISEKS 1.0.1eks-1.0.1EKSCISEKS 1.1.0eks-1.1.0EKSCISEKS 1.2.0eks-1.2.0EKSCISACK 1.0.0ack-1.0ACKCISAKS 1.0.0aks-1.0AKSRHELRedHat OpenShift hardening guiderh-0.7OCP 3.10-3.11CISOCP4 1.1.0rh-1.0OCP 4.1-CIS1.6.0-k3scis-1.6-k3sk3s v1.16-v1.24DISAKubernetes Ver 1, Rel 6eks-stig-kubernetes-v1r6EKSCISTKGI 1.2.53tkgi-1.2.53vmwareCIS1.7.0-rkerke-cis-1.7rke v1.25-v1.27CIS1.7.0-rke2rke2-cis-1.6rke2 v1.25-v1.27CIS1.7.0-k3sk3s-cis-1.7k3s v1.25-v1.27 最新信息请访问 CIS Kubernetes Benchmark support 查看。
默认配置下,Kube-Bench将根据目标设备上运行的Kubernete版原来确定要运行的测试集。
3. 工具安装

3.1 二进制安装

下载地点:https://github.com/aquasecurity/kube-bench/releases
  1. [root@master1 ~]# wget https://github.com/aquasecurity/kube-bench/releases/download/v0.7.3/kube-bench_0.7.3_linux_amd64.tar.gz
  2. [root@master1 ~]# mkdir /opt/kube-bench
  3. # 将二进制文件解压到创建的目录
  4. [root@master1 ~]# tar xf kube-bench_0.7.3_linux_amd64.tar.gz -C /opt/kube-bench/
  5. # 查看文件内容
  6. [root@master1 ~]# cd /opt/kube-bench/
  7. [root@master1  kube-bench]# ls
  8. cfg  kube-bench
  9. [root@master1  kube-bench]# ls cfg/
  10. ack-1.0   cis-1.24           cis-1.6-k3s  eks-1.0.1                 gke-1.0       k3s-cis-1.7    rke2-cis-1.24  rke-cis-1.7
  11. aks-1.0   cis-1.24-microk8s  cis-1.7      eks-1.1.0                 gke-1.2.0     rh-0.7         rke2-cis-1.7   tkgi-1.2.53
  12. cis-1.20  cis-1.5            cis-1.8      eks-1.2.0                 k3s-cis-1.23  rh-1.0         rke-cis-1.23
  13. cis-1.23  cis-1.6            config.yaml  eks-stig-kubernetes-v1r6  k3s-cis-1.24  rke2-cis-1.23  rke-cis-1.24
  14. [root@master1 cfg]# cd cis-1.8/
  15. # 各个组件yaml文件记录了需要检测的详细信息
  16. [root@master1 cis-1.8]# ls
  17. config.yaml  controlplane.yaml  etcd.yaml  master.yaml  node.yaml  policies.yaml
复制代码
cfg/config.yaml包含了相关测试组件配置、配置文件路径、K8S版本和CIS标准映射等。如果k8s的某些配置文件自定义到了非默认的目次,修改config.yaml里的相应目次就行。
  1. [root@master1 kube-bench]# cat cfg/config.yaml
  2. ---
  3. ## Controls Files.
  4. # These are YAML files that hold all the details for running checks.
  5. #
  6. ## Uncomment to use different control file paths.
  7. # masterControls: ./cfg/master.yaml
  8. # nodeControls: ./cfg/node.yaml
  9. master:
  10.   components:
  11.     - apiserver
  12.     - scheduler
  13.     - controllermanager
  14.     - etcd
  15.     - flanneld
  16.     # kubernetes is a component to cover the config file /etc/kubernetes/config that is referred to in the benchmark
  17.     - kubernetes
  18.     - kubelet
  19.   kubernetes:
  20.     defaultconf: /etc/kubernetes/config
  21.   apiserver:
  22.     bins:
  23.       - "kube-apiserver"
  24.       - "hyperkube apiserver"
  25.       - "hyperkube kube-apiserver"
  26.       - "apiserver"
  27.       - "openshift start master api"
  28.       - "hypershift openshift-kube-apiserver"
  29.     confs:
  30.       - /etc/kubernetes/manifests/kube-apiserver.yaml
  31.       - /etc/kubernetes/manifests/kube-apiserver.yml
  32.       - /etc/kubernetes/manifests/kube-apiserver.manifest
  33.       - /var/snap/kube-apiserver/current/args
  34.       - /var/snap/microk8s/current/args/kube-apiserver
  35.       - /etc/origin/master/master-config.yaml
  36.       - /etc/kubernetes/manifests/talos-kube-apiserver.yaml
  37.       - /var/lib/rancher/rke2/agent/pod-manifests/kube-apiserver.yaml
  38.     defaultconf: /etc/kubernetes/manifests/kube-apiserver.yaml
  39.   scheduler:
  40.     bins:
  41.       - "kube-scheduler"
  42. ...
  43. node:
  44.   components:
  45.     - kubelet
  46.     - proxy
  47.     # kubernetes is a component to cover the config file /etc/kubernetes/config that is referred to in the benchmark
  48.     - kubernetes
  49.   kubernetes:
  50.     defaultconf: "/etc/kubernetes/config"
  51.   kubelet:
  52.     cafile:
  53.       - "/etc/kubernetes/pki/ca.crt"
  54.       - "/etc/kubernetes/certs/ca.crt"
  55.       - "/etc/kubernetes/cert/ca.pem"
  56.       - "/var/snap/microk8s/current/certs/ca.crt"
  57.       - "/var/lib/rancher/rke2/agent/server.crt"
  58.       - "/var/lib/rancher/rke2/agent/client-ca.crt"
  59.       - "/var/lib/rancher/k3s/agent/client-ca.crt"
  60. ...
  61. etcd:
  62.   components:
  63.     - etcd
  64.   etcd:
  65.     bins:
  66.       - "etcd"
  67.     datadirs:
  68.       - /var/lib/etcd/default.etcd
  69.       - /var/lib/etcd/data.etcd
  70.     confs:
  71.       - /etc/kubernetes/manifests/etcd.yaml
  72.       - /etc/kubernetes/manifests/etcd.yml
  73. ...
  74. controlplane:
  75.   components:
  76.     - apiserver
  77.   apiserver:
  78.     bins:
  79.       - "kube-apiserver"
  80.       - "hyperkube apiserver"
  81.       - "hyperkube kube-apiserver"
  82.       - "apiserver"
  83. policies:
  84.   components: []
  85. managedservices:
  86.   components: []
  87. version_mapping:
  88.   "1.15": "cis-1.5"
  89.   "1.16": "cis-1.6"
  90. ...
  91. target_mapping:
  92.   "cis-1.5":
  93.     - "master"
  94.     - "node"
  95.     - "controlplane"
  96.     - "etcd"
  97.     - "policies"
  98. ...
复制代码
3.2 源码安装

工具利用go语言开发,实验如下步骤进行源码安装:
  1. # 安装go
  2. yum install go
  3. # 配置go国内镜像源
  4. go env -w GO111MODULE=on
  5. go env -w GOPROXY=https://goproxy.cn,direct
  6. go install github.com/aquasecurity/kube-bench@latest
  7. #安装成功后位于当前用户的go目录下
  8. /root/go/bin
  9. ./kube-bench --help
  10. # Run all checks
  11. ./kube-bench
复制代码
4. 运行kube-bench检测

kube-bench支持etcd组件、master节点、node节点等检测。命令运行语法:
./kube-bench --config-dir <配置目次> --config <配置文件> run --targets=<必要检测的组件>
本文测试的K8S环境如下:
  1. # CPU架构
  2. [root@master1 ~]# lscpu | grep 架构
  3. 架构:                           x86_64
  4.   
  5. # K8S集群信息,master节点同时也承担worker节点的角色
  6. [root@master1 ~]# kubectl get nodes
  7. NAME        STATUS   ROLES                  AGE   VERSION
  8. master1   Ready    control-plane,master   44d   v1.27.6
  9. master2   Ready    control-plane,master   44d   v1.27.6
  10. master3   Ready    control-plane,master   44d   v1.27.6
  11. # K8S版本为1.27.6
  12. [root@master1 ~]# kubectl version
  13. WARNING: This version information is deprecated and will be replaced with the output from kubectl version --short.  Use --output=yaml|json to get the full version.
  14. Client Version: version.Info{Major:"1", Minor:"27", GitVersion:"v1.27.6", GitCommit:"741c8db18a52787d734cbe4795f0b4ad860906d6", GitTreeState:"clean", BuildDate:"2023-09-13T09:21:34Z", GoVersion:"go1.20.8", Compiler:"gc", Platform:"linux/amd64"}
  15. Kustomize Version: v5.0.1
  16. Server Version: version.Info{Major:"1", Minor:"27", GitVersion:"v1.27.6", GitCommit:"741c8db18a52787d734cbe4795f0b4ad860906d6", GitTreeState:"clean", BuildDate:"2023-09-13T09:14:09Z", GoVersion:"go1.20.8", Compiler:"gc", Platform:"linux/amd64"}
  17. # 操作系统为openEuler
  18. [root@master1 ~]# cat /etc/openEuler-latest
  19. openeulerversion=openEuler-22.03-LTS
  20. compiletime=2022-03-30-16-23-56
  21. gccversion=10.3.1-10.oe2203
  22. kernelversion=5.10.0-60.18.0.50.oe2203
  23. openjdkversion=1.8.0.312.b07-11.oe2203
复制代码
4.1 kube-bench检测etcd组件

  1. [root@master1 kube-bench]# ./kube-bench --config-dir ./cfg/ --config ./cfg/config.yaml run --targets=etcd
  2. [INFO] 2 Etcd Node Configuration
  3. [INFO] 2 Etcd Node Configuration
  4. [FAIL] 2.1 Ensure that the --cert-file and --key-file arguments are set as appropriate (Automated)
  5. [FAIL] 2.2 Ensure that the --client-cert-auth argument is set to true (Automated)
  6. [PASS] 2.3 Ensure that the --auto-tls argument is not set to true (Automated)
  7. [FAIL] 2.4 Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (Automated)
  8. [FAIL] 2.5 Ensure that the --peer-client-cert-auth argument is set to true (Automated)
  9. [PASS] 2.6 Ensure that the --peer-auto-tls argument is not set to true (Automated)
  10. [WARN] 2.7 Ensure that a unique Certificate Authority is used for etcd (Manual)
  11. == Remediations etcd ==
  12. 2.1 Follow the etcd service documentation and configure TLS encryption.
  13. Then, edit the etcd pod specification file /etc/kubernetes/manifests/etcd.yaml
  14. on the master node and set the below parameters.
  15. --cert-file=</path/to/ca-file>
  16. --key-file=</path/to/key-file>
  17. 2.2 Edit the etcd pod specification file /etc/kubernetes/manifests/etcd.yaml on the master
  18. node and set the below parameter.
  19. --client-cert-auth="true"
  20. 2.4 Follow the etcd service documentation and configure peer TLS encryption as appropriate
  21. for your etcd cluster.
  22. Then, edit the etcd pod specification file /etc/kubernetes/manifests/etcd.yaml on the
  23. master node and set the below parameters.
  24. --peer-client-file=</path/to/peer-cert-file>
  25. --peer-key-file=</path/to/peer-key-file>
  26. 2.5 Edit the etcd pod specification file /etc/kubernetes/manifests/etcd.yaml on the master
  27. node and set the below parameter.
  28. --peer-client-cert-auth=true
  29. 2.7 [Manual test]
  30. Follow the etcd documentation and create a dedicated certificate authority setup for the
  31. etcd service.
  32. Then, edit the etcd pod specification file /etc/kubernetes/manifests/etcd.yaml on the
  33. master node and set the below parameter.
  34. --trusted-ca-file=</path/to/ca-file>
  35. == Summary etcd ==
  36. 2 checks PASS
  37. 4 checks FAIL
  38. 1 checks WARN
  39. 0 checks INFO
  40. == Summary total ==
  41. 2 checks PASS
  42. 4 checks FAIL
  43. 1 checks WARN
  44. 0 checks INFO
复制代码
根据汇总效果,检测出4个Fail,1个Warn,打印效果给出了相应的具体问题说明和解决方法。
4.2 kube-bench检测master节点

  1. [root@master1 kube-bench]# ./kube-bench --config-dir ./cfg/ --config ./cfg/config.yaml run --targets=master
  2. [INFO] 1 Control Plane Security Configuration
  3. [INFO] 1.1 Control Plane Node Configuration Files
  4. [PASS] 1.1.1 Ensure that the API server pod specification file permissions are set to 600 or more restrictive (Automated)
  5. [PASS] 1.1.2 Ensure that the API server pod specification file ownership is set to root:root (Automated)
  6. [PASS] 1.1.3 Ensure that the controller manager pod specification file permissions are set to 600 or more restrictive (Automated)
  7. [PASS] 1.1.4 Ensure that the controller manager pod specification file ownership is set to root:root (Automated)
  8. [PASS] 1.1.5 Ensure that the scheduler pod specification file permissions are set to 600 or more restrictive (Automated)
  9. [PASS] 1.1.6 Ensure that the scheduler pod specification file ownership is set to root:root (Automated)
  10. [FAIL] 1.1.7 Ensure that the etcd pod specification file permissions are set to 600 or more restrictive (Automated)
  11. [FAIL] 1.1.8 Ensure that the etcd pod specification file ownership is set to root:root (Automated)
  12. [WARN] 1.1.9 Ensure that the Container Network Interface file permissions are set to 600 or more restrictive (Manual)
  13. [WARN] 1.1.10 Ensure that the Container Network Interface file ownership is set to root:root (Manual)
  14. [PASS] 1.1.11 Ensure that the etcd data directory permissions are set to 700 or more restrictive (Automated)
  15. [FAIL] 1.1.12 Ensure that the etcd data directory ownership is set to etcd:etcd (Automated)
  16. [FAIL] 1.1.13 Ensure that the admin.conf file permissions are set to 600 or more restrictive (Automated)
  17. [PASS] 1.1.14 Ensure that the admin.conf file ownership is set to root:root (Automated)
  18. [FAIL] 1.1.15 Ensure that the scheduler.conf file permissions are set to 600 or more restrictive (Automated)
  19. [PASS] 1.1.16 Ensure that the scheduler.conf file ownership is set to root:root (Automated)
  20. [FAIL] 1.1.17 Ensure that the controller-manager.conf file permissions are set to 600 or more restrictive (Automated)
  21. [PASS] 1.1.18 Ensure that the controller-manager.conf file ownership is set to root:root (Automated)
  22. [PASS] 1.1.19 Ensure that the Kubernetes PKI directory and file ownership is set to root:root (Automated)
  23. [WARN] 1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictive (Manual)
  24. [WARN] 1.1.21 Ensure that the Kubernetes PKI key file permissions are set to 600 (Manual)
  25. [INFO] 1.2 API Server
  26. [WARN] 1.2.1 Ensure that the --anonymous-auth argument is set to false (Manual)
  27. [PASS] 1.2.2 Ensure that the --token-auth-file parameter is not set (Automated)
  28. [WARN] 1.2.3 Ensure that the --DenyServiceExternalIPs is set (Manual)
  29. [PASS] 1.2.4 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate (Automated)
  30. [FAIL] 1.2.5 Ensure that the --kubelet-certificate-authority argument is set as appropriate (Automated)
  31. [PASS] 1.2.6 Ensure that the --authorization-mode argument is not set to AlwaysAllow (Automated)
  32. [PASS] 1.2.7 Ensure that the --authorization-mode argument includes Node (Automated)
  33. [PASS] 1.2.8 Ensure that the --authorization-mode argument includes RBAC (Automated)
  34. [WARN] 1.2.9 Ensure that the admission control plugin EventRateLimit is set (Manual)
  35. [PASS] 1.2.10 Ensure that the admission control plugin AlwaysAdmit is not set (Automated)
  36. [WARN] 1.2.11 Ensure that the admission control plugin AlwaysPullImages is set (Manual)
  37. [WARN] 1.2.12 Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used (Manual)
  38. [PASS] 1.2.13 Ensure that the admission control plugin ServiceAccount is set (Automated)
  39. [PASS] 1.2.14 Ensure that the admission control plugin NamespaceLifecycle is set (Automated)
  40. [PASS] 1.2.15 Ensure that the admission control plugin NodeRestriction is set (Automated)
  41. [FAIL] 1.2.16 Ensure that the --profiling argument is set to false (Automated)
  42. [FAIL] 1.2.17 Ensure that the --audit-log-path argument is set (Automated)
  43. [FAIL] 1.2.18 Ensure that the --audit-log-maxage argument is set to 30 or as appropriate (Automated)
  44. [FAIL] 1.2.19 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate (Automated)
  45. [FAIL] 1.2.20 Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate (Automated)
  46. [WARN] 1.2.21 Ensure that the --request-timeout argument is set as appropriate (Manual)
  47. [PASS] 1.2.22 Ensure that the --service-account-lookup argument is set to true (Automated)
  48. [PASS] 1.2.23 Ensure that the --service-account-key-file argument is set as appropriate (Automated)
  49. [PASS] 1.2.24 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (Automated)
  50. [PASS] 1.2.25 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Automated)
  51. [PASS] 1.2.26 Ensure that the --client-ca-file argument is set as appropriate (Automated)
  52. [PASS] 1.2.27 Ensure that the --etcd-cafile argument is set as appropriate (Automated)
  53. [WARN] 1.2.28 Ensure that the --encryption-provider-config argument is set as appropriate (Manual)
  54. [WARN] 1.2.29 Ensure that encryption providers are appropriately configured (Manual)
  55. [PASS] 1.2.30 Ensure that the API Server only makes use of Strong Cryptographic Ciphers (Manual)
  56. [INFO] 1.3 Controller Manager
  57. [WARN] 1.3.1 Ensure that the --terminated-pod-gc-threshold argument is set as appropriate (Manual)
  58. [FAIL] 1.3.2 Ensure that the --profiling argument is set to false (Automated)
  59. [PASS] 1.3.3 Ensure that the --use-service-account-credentials argument is set to true (Automated)
  60. [PASS] 1.3.4 Ensure that the --service-account-private-key-file argument is set as appropriate (Automated)
  61. [PASS] 1.3.5 Ensure that the --root-ca-file argument is set as appropriate (Automated)
  62. [PASS] 1.3.6 Ensure that the RotateKubeletServerCertificate argument is set to true (Automated)
  63. [PASS] 1.3.7 Ensure that the --bind-address argument is set to 127.0.0.1 (Automated)
  64. [INFO] 1.4 Scheduler
  65. [FAIL] 1.4.1 Ensure that the --profiling argument is set to false (Automated)
  66. [PASS] 1.4.2 Ensure that the --bind-address argument is set to 127.0.0.1 (Automated)
  67. == Remediations master ==
  68. 1.1.7 Run the below command (based on the file location on your system) on the control plane node.
  69. For example,
  70. chmod 600 /etc/kubernetes/manifests/etcd.yaml
  71. 1.1.8 Run the below command (based on the file location on your system) on the control plane node.
  72. For example,
  73. chown root:root /etc/kubernetes/manifests/etcd.yaml
  74. 1.1.9 Run the below command (based on the file location on your system) on the control plane node.
  75. For example, chmod 600 <path/to/cni/files>
  76. 1.1.10 Run the below command (based on the file location on your system) on the control plane node.
  77. For example,
  78. chown root:root <path/to/cni/files>
  79. 1.1.12 On the etcd server node, get the etcd data directory, passed as an argument --data-dir,
  80. from the command 'ps -ef | grep etcd'.
  81. Run the below command (based on the etcd data directory found above).
  82. For example, chown etcd:etcd /var/lib/etcd
  83. 1.1.13 Run the below command (based on the file location on your system) on the control plane node.
  84. For example, chmod 600 /etc/kubernetes/admin.conf
  85. 1.1.15 Run the below command (based on the file location on your system) on the control plane node.
  86. For example,
  87. chmod 600 /etc/kubernetes/scheduler.conf
  88. 1.1.17 Run the below command (based on the file location on your system) on the control plane node.
  89. For example,
  90. chmod 600 /etc/kubernetes/controller-manager.conf
  91. 1.1.20 Run the below command (based on the file location on your system) on the control plane node.
  92. For example,
  93. chmod -R 600 /etc/kubernetes/pki/*.crt
  94. 1.1.21 Run the below command (based on the file location on your system) on the control plane node.
  95. For example,
  96. chmod -R 600 /etc/kubernetes/pki/*.key
  97. 1.2.1 Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  98. on the control plane node and set the below parameter.
  99. --anonymous-auth=false
  100. 1.2.3 Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  101. on the control plane node and remove the `DenyServiceExternalIPs`
  102. from enabled admission plugins.
  103. 1.2.5 Follow the Kubernetes documentation and setup the TLS connection between
  104. the apiserver and kubelets. Then, edit the API server pod specification file
  105. /etc/kubernetes/manifests/kube-apiserver.yaml on the control plane node and set the
  106. --kubelet-certificate-authority parameter to the path to the cert file for the certificate authority.
  107. --kubelet-certificate-authority=<ca-string>
  108. 1.2.9 Follow the Kubernetes documentation and set the desired limits in a configuration file.
  109. Then, edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  110. and set the below parameters.
  111. --enable-admission-plugins=...,EventRateLimit,...
  112. --admission-control-config-file=<path/to/configuration/file>
  113. 1.2.11 Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  114. on the control plane node and set the --enable-admission-plugins parameter to include
  115. AlwaysPullImages.
  116. --enable-admission-plugins=...,AlwaysPullImages,...
  117. 1.2.12 Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  118. on the control plane node and set the --enable-admission-plugins parameter to include
  119. SecurityContextDeny, unless PodSecurityPolicy is already in place.
  120. --enable-admission-plugins=...,SecurityContextDeny,...
  121. 1.2.16 Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  122. on the control plane node and set the below parameter.
  123. --profiling=false
  124. 1.2.17 Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  125. on the control plane node and set the --audit-log-path parameter to a suitable path and
  126. file where you would like audit logs to be written, for example,
  127. --audit-log-path=/var/log/apiserver/audit.log
  128. 1.2.18 Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  129. on the control plane node and set the --audit-log-maxage parameter to 30
  130. or as an appropriate number of days, for example,
  131. --audit-log-maxage=30
  132. 1.2.19 Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  133. on the control plane node and set the --audit-log-maxbackup parameter to 10 or to an appropriate
  134. value. For example,
  135. --audit-log-maxbackup=10
  136. 1.2.20 Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  137. on the control plane node and set the --audit-log-maxsize parameter to an appropriate size in MB.
  138. For example, to set it as 100 MB, --audit-log-maxsize=100
  139. 1.2.21 Edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  140. and set the below parameter as appropriate and if needed.
  141. For example, --request-timeout=300s
  142. 1.2.28 Follow the Kubernetes documentation and configure a EncryptionConfig file.
  143. Then, edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml
  144. on the control plane node and set the --encryption-provider-config parameter to the path of that file.
  145. For example, --encryption-provider-config=</path/to/EncryptionConfig/File>
  146. 1.2.29 Follow the Kubernetes documentation and configure a EncryptionConfig file.
  147. In this file, choose aescbc, kms or secretbox as the encryption provider.
  148. 1.3.1 Edit the Controller Manager pod specification file /etc/kubernetes/manifests/kube-controller-manager.yaml
  149. on the control plane node and set the --terminated-pod-gc-threshold to an appropriate threshold,
  150. for example, --terminated-pod-gc-threshold=10
  151. 1.3.2 Edit the Controller Manager pod specification file /etc/kubernetes/manifests/kube-controller-manager.yaml
  152. on the control plane node and set the below parameter.
  153. --profiling=false
  154. 1.4.1 Edit the Scheduler pod specification file /etc/kubernetes/manifests/kube-scheduler.yaml file
  155. on the control plane node and set the below parameter.
  156. --profiling=false
  157. == Summary master ==
  158. 33 checks PASS
  159. 14 checks FAIL
  160. 13 checks WARN
  161. 0 checks INFO
  162. == Summary total ==
  163. 33 checks PASS
  164. 14 checks FAIL
  165. 13 checks WARN
  166. 0 checks INFO
复制代码
检测到14个Fail,可以根据给出的修补方案进行修改。
4.3 kube-bench检测worker节点

  1. [root@master1 kube-bench]# ./kube-bench --config-dir ./cfg/ --config ./cfg/config.yaml run --targets=node
  2. [INFO] 4 Worker Node Security Configuration
  3. [INFO] 4.1 Worker Node Configuration Files
  4. [FAIL] 4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive (Automated)
  5. [PASS] 4.1.2 Ensure that the kubelet service file ownership is set to root:root (Automated)
  6. [WARN] 4.1.3 If proxy kubeconfig file exists ensure permissions are set to 600 or more restrictive (Manual)
  7. [WARN] 4.1.4 If proxy kubeconfig file exists ensure ownership is set to root:root (Manual)
  8. [PASS] 4.1.5 Ensure that the --kubeconfig kubelet.conf file permissions are set to 600 or more restrictive (Automated)
  9. [PASS] 4.1.6 Ensure that the --kubeconfig kubelet.conf file ownership is set to root:root (Automated)
  10. [WARN] 4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive (Manual)
  11. [PASS] 4.1.8 Ensure that the client certificate authorities file ownership is set to root:root (Manual)
  12. [FAIL] 4.1.9 If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictive (Automated)
  13. [PASS] 4.1.10 If the kubelet config.yaml configuration file is being used validate file ownership is set to root:root (Automated)
  14. [INFO] 4.2 Kubelet
  15. [PASS] 4.2.1 Ensure that the --anonymous-auth argument is set to false (Automated)
  16. [PASS] 4.2.2 Ensure that the --authorization-mode argument is not set to AlwaysAllow (Automated)
  17. [PASS] 4.2.3 Ensure that the --client-ca-file argument is set as appropriate (Automated)
  18. [PASS] 4.2.4 Verify that the --read-only-port argument is set to 0 (Manual)
  19. [PASS] 4.2.5 Ensure that the --streaming-connection-idle-timeout argument is not set to 0 (Manual)
  20. [PASS] 4.2.6 Ensure that the --make-iptables-util-chains argument is set to true (Automated)
  21. [PASS] 4.2.7 Ensure that the --hostname-override argument is not set (Manual)
  22. [PASS] 4.2.8 Ensure that the eventRecordQPS argument is set to a level which ensures appropriate event capture (Manual)
  23. [WARN] 4.2.9 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Manual)
  24. [PASS] 4.2.10 Ensure that the --rotate-certificates argument is not set to false (Automated)
  25. [PASS] 4.2.11 Verify that the RotateKubeletServerCertificate argument is set to true (Manual)
  26. [WARN] 4.2.12 Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (Manual)
  27. [WARN] 4.2.13 Ensure that a limit is set on pod PIDs (Manual)
  28. == Remediations node ==
  29. 4.1.1 Run the below command (based on the file location on your system) on the each worker node.
  30. For example, chmod 600 /etc/systemd/system/kubelet.service.d/10-kubeadm.conf
  31. 4.1.3 Run the below command (based on the file location on your system) on the each worker node.
  32. For example,
  33. chmod 600 /etc/kubernetes/proxy.conf
  34. 4.1.4 Run the below command (based on the file location on your system) on the each worker node.
  35. For example, chown root:root /etc/kubernetes/proxy.conf
  36. 4.1.7 Run the following command to modify the file permissions of the
  37. --client-ca-file chmod 600 <filename>
  38. 4.1.9 Run the following command (using the config file location identified in the Audit step)
  39. chmod 600 /var/lib/kubelet/config.yaml
  40. 4.2.9 If using a Kubelet config file, edit the file to set `tlsCertFile` to the location
  41. of the certificate file to use to identify this Kubelet, and `tlsPrivateKeyFile`
  42. to the location of the corresponding private key file.
  43. If using command line arguments, edit the kubelet service file
  44. /etc/systemd/system/kubelet.service.d/10-kubeadm.conf on each worker node and
  45. set the below parameters in KUBELET_CERTIFICATE_ARGS variable.
  46. --tls-cert-file=<path/to/tls-certificate-file>
  47. --tls-private-key-file=<path/to/tls-key-file>
  48. Based on your system, restart the kubelet service. For example,
  49. systemctl daemon-reload
  50. systemctl restart kubelet.service
  51. 4.2.12 If using a Kubelet config file, edit the file to set `TLSCipherSuites` to
  52. TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256
  53. or to a subset of these values.
  54. If using executable arguments, edit the kubelet service file
  55. /etc/systemd/system/kubelet.service.d/10-kubeadm.conf on each worker node and
  56. set the --tls-cipher-suites parameter as follows, or to a subset of these values.
  57. --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256
  58. Based on your system, restart the kubelet service. For example:
  59. systemctl daemon-reload
  60. systemctl restart kubelet.service
  61. 4.2.13 Decide on an appropriate level for this parameter and set it,
  62. either via the --pod-max-pids command line parameter or the PodPidsLimit configuration file setting.
  63. == Summary node ==
  64. 15 checks PASS
  65. 2 checks FAIL
  66. 6 checks WARN
  67. 0 checks INFO
  68. == Summary total ==
  69. 15 checks PASS
  70. 2 checks FAIL
  71. 6 checks WARN
  72. 0 checks INFO
复制代码
检测到2个Fail,可以根据给出的修补方案进行修改。
4.4 实验全部检测

  1. # 不加targets执行全部检测
  2. [root@master1 kube-bench]# ./kube-bench --config-dir ./cfg/ --config ./cfg/config.yaml run
复制代码
4.5 手动设置不安全的参数进行检测

可以手动构造不安全的设置,利用工具进行检测:

  • 构造etcd不安全设置,将/etc/kubernetes/manifests/etcd.yaml文件里的client-cert-auth=true改为client-cert-auth=false。
  • 构造kube-apiserver不安全设置,将/etc/kubernetes/manifests/kube-apiserver.yaml文件里的authorization-mode授权模式改为AlwaysAllow。
修改后重启kubelet使配置见效,然后利用kube-bench检测是否能检测到,具体操作查看文末的参考资料。
5. 总结

kube-bench是一款强大的工具,它可以资助我们发现哪些Kubernetes配置没有遵循CIS的最佳实践,从而改正这些问题,加强我们的Kubernetes集群的安全性。虽然kube-bench不能捕获全部可能的安全问题,但它至少可以资助我们消除最常见的一些安全毛病。
6. 问题记录


  • Centos7.9 K8S 环境下面运行kube-bench遇到glibc配套问题,必要更新系统的glibc版本到2.32,由于更新glibc可能造成系统不稳固,改换了系统进行测试。
  1. [root@k8s-master kube-bench]# ./kube-bench --config-dir `pwd`/cfg --config `pwd`/cfg/config.yaml run --targets=etcd
  2. ./kube-bench: /lib64/libc.so.6: version `GLIBC_2.32' not found (required by ./kube-bench)
  3. ./kube-bench: /lib64/libc.so.6: version `GLIBC_2.34' not found (required by ./kube-bench)
复制代码
7. 参考资料

https://www.cnblogs.com/renshengdezheli/p/17640119.html

免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!更多信息从访问主页:qidao123.com:ToB企服之家,中国第一个企服评测及商务社交产业平台。
回复

使用道具 举报

0 个回复

倒序浏览

快速回复

您需要登录后才可以回帖 登录 or 立即注册

本版积分规则

卖不甜枣

金牌会员
这个人很懒什么都没写!
快速回复 返回顶部 返回列表