1. Docs
  2. Reference
  3. Pre-built Policy Packs
  4. CIS Kubernetes
  5. Azure (AKS)

CIS Kubernetes - Azure (AKS)

    This page lists all 30 policies in the CIS Kubernetes pack for Azure (AKS).

    Policy NameDescriptionFramework ReferenceFramework Specification
    aks-cluster-audit-logging-enabledEnsure AKS clusters have audit logging enabled to track all API server requests.2.1Enable audit logs for AKS clusters to track all API server requests and administrative actions.
    k8s-cluster-admin-role-binding-minimizedMinimize the use of cluster-admin role bindings in Kubernetes.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-rbac-secret-access-minimizedMinimize access to secrets in Kubernetes RBAC policies.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-rbac-wildcard-use-minimizedMinimize the use of wildcards in Kubernetes RBAC policies.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-rbac-create-pods-minimizedMinimize the ability to create pods in Kubernetes RBAC policies.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-default-service-accounts-not-usedEnsure default service accounts are not actively used in Kubernetes.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-service-account-token-mounted-minimizedMinimize automatic mounting of service account tokens in Kubernetes.4.1Restrict administrator privileges to dedicated administrator accounts on enterprise assets. Implement proper RBAC controls.
    k8s-pod-security-privileged-containers-minimizedMinimize the admission of privileged containers in Kubernetes.4.2Minimize the admission of privileged containers and containers with dangerous capabilities.
    k8s-pod-security-host-pid-minimizedMinimize the admission of containers with hostPID in Kubernetes.4.2Minimize the admission of privileged containers and containers with dangerous capabilities.
    k8s-pod-security-host-ipc-minimizedMinimize the admission of containers with hostIPC in Kubernetes.4.2Minimize the admission of privileged containers and containers with dangerous capabilities.
    k8s-pod-security-host-network-minimizedMinimize the admission of containers with hostNetwork in Kubernetes.4.2Minimize the admission of privileged containers and containers with dangerous capabilities.
    k8s-pod-security-allow-privilege-escalation-minimizedMinimize the admission of containers with allowPrivilegeEscalation in Kubernetes.4.2Minimize the admission of privileged containers and containers with dangerous capabilities.
    k8s-namespaces-network-policies-definedEnsure that all Namespaces have Network Policies defined.4.4Ensure that all Namespaces have Network Policies defined.
    k8s-secrets-as-files-not-env-varsPrefer using secrets as files over secrets as environment variables in Kubernetes.4.5-4.6Prefer using secrets as files over secrets as environment variables. Ensure default namespace is not used for workloads. Apply security context to pods and containers.
    k8s-resource-namespace-boundariesEnsure resources are deployed within appropriate namespace boundaries.4.5-4.6Prefer using secrets as files over secrets as environment variables. Ensure default namespace is not used for workloads. Apply security context to pods and containers.
    k8s-pod-security-context-appliedEnsure security context is applied to pods and containers.4.5-4.6Prefer using secrets as files over secrets as environment variables. Ensure default namespace is not used for workloads. Apply security context to pods and containers.
    k8s-default-namespace-not-usedEnsure the default namespace is not used for workloads in Kubernetes.4.5-4.6Prefer using secrets as files over secrets as environment variables. Ensure default namespace is not used for workloads. Apply security context to pods and containers.
    aks-defender-container-scanning-enabledEnsure Image Vulnerability Scanning using Microsoft Defender for Cloud is enabled.5.1Ensure Image Vulnerability Scanning using Microsoft Defender for Cloud (MDC). Minimize user access to Azure Container Registry (ACR).
    acr-user-access-minimizedMinimize user access to Azure Container Registry (ACR).5.1Ensure Image Vulnerability Scanning using Microsoft Defender for Cloud (MDC). Minimize user access to Azure Container Registry (ACR).
    aks-acr-readonly-accessEnsure AKS clusters have read-only access to ACR.5.1Ensure Image Vulnerability Scanning using Microsoft Defender for Cloud (MDC). Minimize user access to Azure Container Registry (ACR).
    aks-approved-registries-onlyEnsure AKS clusters only pull images from approved registries.5.1Ensure Image Vulnerability Scanning using Microsoft Defender for Cloud (MDC). Minimize user access to Azure Container Registry (ACR).
    aks-dedicated-service-accountsPrefer using dedicated AKS Service Accounts.5.2Prefer using dedicated AKS Service Accounts.
    aks-secrets-encryption-enabledEnsure Kubernetes Secrets are encrypted in AKS.5.3Ensure Kubernetes Secrets are encrypted.
    aks-cluster-endpoint-restrict-public-accessRestrict access to the AKS control plane endpoint.5.4Restrict Access to the Control Plane Endpoint. Ensure clusters are created with Private Endpoints and Private Nodes. Enable Network Policy. Encrypt traffic to HTTPS load balancers.
    aks-private-endpoint-enabledEnsure AKS clusters are created with Private Endpoints.5.4Restrict Access to the Control Plane Endpoint. Ensure clusters are created with Private Endpoints and Private Nodes. Enable Network Policy. Encrypt traffic to HTTPS load balancers.
    aks-private-nodes-enabledEnsure AKS clusters are created with Private Nodes.5.4Restrict Access to the Control Plane Endpoint. Ensure clusters are created with Private Endpoints and Private Nodes. Enable Network Policy. Encrypt traffic to HTTPS load balancers.
    aks-network-policy-enabledEnsure Network Policy is enabled and configured appropriately in AKS.5.4Restrict Access to the Control Plane Endpoint. Ensure clusters are created with Private Endpoints and Private Nodes. Enable Network Policy. Encrypt traffic to HTTPS load balancers.
    aks-load-balancer-tls-encryptionEncrypt traffic to HTTPS load balancers with TLS certificates.5.4Restrict Access to the Control Plane Endpoint. Ensure clusters are created with Private Endpoints and Private Nodes. Enable Network Policy. Encrypt traffic to HTTPS load balancers.
    aks-azure-ad-integration-enabledManage Kubernetes RBAC users with Azure AD.5.5Manage Kubernetes RBAC users with Azure AD. Use Azure RBAC for Kubernetes Authorization.
    aks-azure-rbac-enabledUse Azure RBAC for Kubernetes Authorization.5.5Manage Kubernetes RBAC users with Azure AD. Use Azure RBAC for Kubernetes Authorization.
      Neo just got smarter about infrastructure policy automation