Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
GCP
Loading policies...

Policy: GCP > CIS v1 > 7 Kubernetes Engine

Covers recommendations addressing Google Kubernetes Engine.

Targets

This policy targets the following resource types:

  • GCP > Project

Primary Policy

This policy is used with the following primary policy:

  • GCP > CIS v1

Related Policies

  • 7.01 Ensure Stackdriver Logging is set to Enabled on Kubernetes Engine Clusters (Scored)
  • 7.02 Ensure Stackdriver Monitoring is set to Enabled on Kubernetes Engine Clusters (Scored)
  • 7.03 Ensure Legacy Authorization is set to Disabled on Kubernetes Engine Clusters (Scored)
  • 7.04 Ensure Master authorized networks is set to Enabled on Kubernetes Engine Clusters (Not Scored)
  • 7.05 Ensure Kubernetes Clusters are configured with Labels (Not Scored)
  • 7.06 Ensure Kubernetes web UI / Dashboard is disabled (Scored)
  • 7.07 Ensure `Automatic node repair` is enabled for Kubernetes Clusters (Scored)
  • 7.08 Ensure Automatic node upgrades is enabled on Kubernetes Engine Clusters nodes (Scored)
  • 7.09 Ensure Container-Optimized OS (cos) is used for Kubernetes Engine Clusters Node image (Not Scored)
  • 7.10 Ensure Basic Authentication is disabled on Kubernetes Engine Clusters (Scored)
  • 7.11 Ensure Network policy is enabled on Kubernetes Engine Clusters (Scored)
  • 7.12 Ensure Kubernetes Cluster is created with Client Certificate enabled (Scored)
  • 7.13 Ensure Kubernetes Cluster is created with Alias IP ranges enabled (Scored)
  • 7.14 Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters (Scored)
  • 7.15 Ensure Kubernetes Cluster is created with Private cluster enabled (Scored)
  • 7.17 Ensure default Service account is not used for Project access in Kubernetes Clusters (Scored)
  • 7.18 Ensure Kubernetes Clusters created with limited service account Access scopes for Project access (Scored)

Policy Specification

Schema Type
string
Default
Skip
Valid Values [YAML]
  • Skip
    
Examples [YAML]
  • Skip
    

Category

  • CIS

In Your Workspace

  • Policy Settings by Type report

Developers

    Category URI
    • tmod:@turbot/cis#/control/categories/cis
  • Policy Type URI
    • tmod:@turbot/gcp-cisv1#/policy/types/s07
  • GraphQL
    • query policyType(id: "tmod:@turbot/gcp-cisv1#/policy/types/s07") { … }
    • query policySettings(filter: "policyTypeId:'tmod:@turbot/gcp-cisv1#/policy/types/s07'") { … }
    • query policyValues(filter: "policyTypeId:'tmod:@turbot/gcp-cisv1#/policy/types/s07'") { … }
  • CLI
    • Get Policy Type
    • turbot graphql policy-type --id "tmod:@turbot/gcp-cisv1#/policy/types/s07"
    • Get Policy Settings
    • turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/gcp-cisv1#/policy/types/s07"
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
39
Mods
130
Resource Types
2,226
Policies
1,100
Controls
35
Quick Actions
83
IAM