1. Docs
  2. Reference
  3. Pre-built Policy Packs
  4. CIS Kubernetes
  5. AWS (EKS)

CIS Kubernetes - AWS (EKS)

    This page lists all 27 policies in the CIS Kubernetes pack for AWS (EKS).

    Policy NameDescriptionFramework ReferenceFramework Specification
    eks-cluster-audit-logging-enabledEnsure EKS clusters have audit logging enabled to track all API server requests.2.1Enable audit logs for EKS clusters to track all API server requests and administrative actions.
    eks-cluster-cloudwatch-logs-enabledEnsure EKS clusters have CloudWatch Logs enabled for centralized log management.2.1Enable audit logs for EKS clusters to track all API server requests and administrative actions.
    eks-node-group-launch-template-requiredEnsure EKS node groups use launch templates for consistent configuration.3.1-3.2Ensure kubelet configuration follows security best practices including proper authentication, authorization, and file permissions.
    eks-launch-template-kubelet-configEnsure EKS launch templates have secure kubelet configuration.3.1-3.2Ensure kubelet configuration follows security best practices including proper authentication, authorization, and file permissions.
    eks-cluster-access-manager-enabledEnsure EKS clusters have access manager enabled for centralized access control.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    eks-iam-authenticator-enabledEnsure EKS clusters use IAM authenticator for secure authentication.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-cluster-admin-role-binding-minimizedMinimize the use of cluster-admin role bindings in Kubernetes.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-rbac-secret-access-minimizedMinimize access to secrets in Kubernetes RBAC policies.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-rbac-wildcard-use-minimizedMinimize the use of wildcards in Kubernetes RBAC policies.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-rbac-create-pods-minimizedMinimize the ability to create pods in Kubernetes RBAC policies.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-rbac-bind-impersonate-escalate-minimizedMinimize bind, impersonate, and escalate permissions in Kubernetes RBAC policies.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-default-service-accounts-not-usedEnsure default service accounts are not actively used in Kubernetes.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-service-account-token-mounted-minimizedMinimize automatic mounting of service account tokens in Kubernetes.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-pod-security-privileged-containers-minimizedMinimize the admission of privileged containers in Kubernetes.4.2Implement and manage a firewall on servers. Minimize the admission of privileged containers and containers with dangerous capabilities.
    k8s-pod-security-host-pid-minimizedMinimize the admission of containers with hostPID in Kubernetes.4.2Implement and manage a firewall on servers. Minimize the admission of privileged containers and containers with dangerous capabilities.
    k8s-pod-security-host-ipc-minimizedMinimize the admission of containers with hostIPC in Kubernetes.4.2Implement and manage a firewall on servers. Minimize the admission of privileged containers and containers with dangerous capabilities.
    k8s-pod-security-host-network-minimizedMinimize the admission of containers with hostNetwork in Kubernetes.4.2Implement and manage a firewall on servers. Minimize the admission of privileged containers and containers with dangerous capabilities.
    k8s-pod-security-allow-privilege-escalation-minimizedMinimize the admission of containers with allowPrivilegeEscalation in Kubernetes.4.2Implement and manage a firewall on servers. Minimize the admission of privileged containers and containers with dangerous capabilities.
    k8s-secrets-as-files-not-env-varsPrefer using secrets as files over secrets as environment variables in Kubernetes.4.4-4.5Prefer using secrets as files over secrets as environment variables. Ensure default namespace is not used for workloads.
    k8s-default-namespace-not-usedEnsure the default namespace is not used for workloads in Kubernetes.4.4-4.5Prefer using secrets as files over secrets as environment variables. Ensure default namespace is not used for workloads.
    eks-ecr-image-scanning-enabledEnsure Amazon ECR image scanning is enabled for vulnerability detection.5.1Ensure Image Vulnerability Scanning using Amazon ECR image scanning. Minimize user access to Amazon ECR.
    eks-ecr-private-repositoryEnsure ECR repositories are private to minimize unauthorized access.5.1Ensure Image Vulnerability Scanning using Amazon ECR image scanning. Minimize user access to Amazon ECR.
    eks-service-accounts-iam-role-bindingPrefer using dedicated EKS Service Accounts with IAM role bindings.5.2-5.3Prefer using dedicated EKS Service Accounts. Ensure Kubernetes Secrets are encrypted using Customer Master Keys (CMKs) managed in AWS KMS.
    eks-secrets-encryption-kms-enabledEnsure Kubernetes Secrets are encrypted using KMS Customer Master Keys.5.2-5.3Prefer using dedicated EKS Service Accounts. Ensure Kubernetes Secrets are encrypted using Customer Master Keys (CMKs) managed in AWS KMS.
    eks-node-group-iam-role-minimal-policyEnsure EKS node group IAM roles follow the principle of least privilege.5.2-5.3Prefer using dedicated EKS Service Accounts. Ensure Kubernetes Secrets are encrypted using Customer Master Keys (CMKs) managed in AWS KMS.
    eks-cluster-endpoint-restrict-public-accessRestrict access to the EKS control plane endpoint.5.4Restrict Access to the Control Plane Endpoint. Ensure Network Policy is Enabled and set as appropriate. Encrypt traffic to HTTPS load balancers with TLS certificates.
    eks-network-policy-enabledEnsure Network Policy is enabled and configured appropriately in EKS.5.4Restrict Access to the Control Plane Endpoint. Ensure Network Policy is Enabled and set as appropriate. Encrypt traffic to HTTPS load balancers with TLS certificates.
    eks-load-balancer-tls-encryptionEncrypt traffic to HTTPS load balancers with TLS certificates.5.4Restrict Access to the Control Plane Endpoint. Ensure Network Policy is Enabled and set as appropriate. Encrypt traffic to HTTPS load balancers with TLS certificates.
      Neo just got smarter about infrastructure policy automation