1. Docs
  2. Reference
  3. Pre-built Policy Packs
  4. CIS Kubernetes
  5. Google Cloud (GKE)

CIS Kubernetes - Google Cloud (GKE)

    This page lists all 50 policies in the CIS Kubernetes pack for Google Cloud (GKE).

    Policy NameDescriptionFramework ReferenceFramework Specification
    k8s-cluster-admin-role-binding-minimizedMinimize the use of cluster-admin role bindings in Kubernetes.4.1Implement proper RBAC controls to restrict system group bindings and minimize permissions.
    k8s-rbac-secret-access-minimizedMinimize access to secrets in Kubernetes RBAC policies.4.1Implement proper RBAC controls to restrict system group bindings and minimize permissions.
    k8s-rbac-wildcard-use-minimizedMinimize the use of wildcards in Kubernetes RBAC policies.4.1Implement proper RBAC controls to restrict system group bindings and minimize permissions.
    k8s-default-service-accounts-not-usedEnsure default service accounts are not actively used in Kubernetes.4.1Implement proper RBAC controls to restrict system group bindings and minimize permissions.
    k8s-service-account-token-mounted-minimizedMinimize automatic mounting of service account tokens in Kubernetes.4.1Implement proper RBAC controls to restrict system group bindings and minimize permissions.
    k8s-rbac-system-masters-group-avoidedAvoid use of system:masters group in Kubernetes RBAC.4.1Implement proper RBAC controls to restrict system group bindings and minimize permissions.
    k8s-rbac-bind-impersonate-escalate-minimizedMinimize bind, impersonate, and escalate permissions in Kubernetes RBAC policies.4.1Implement proper RBAC controls to restrict system group bindings and minimize permissions.
    k8s-rbac-system-anonymous-bindings-minimizedMinimize bindings to system:anonymous in Kubernetes RBAC.4.1Implement proper RBAC controls to restrict system group bindings and minimize permissions.
    k8s-rbac-system-unauthenticated-bindings-minimizedMinimize bindings to system:unauthenticated in Kubernetes RBAC.4.1Implement proper RBAC controls to restrict system group bindings and minimize permissions.
    k8s-rbac-system-authenticated-bindings-minimizedMinimize bindings to system:authenticated in Kubernetes RBAC.4.1Implement proper RBAC controls to restrict system group bindings and minimize permissions.
    k8s-pod-security-privileged-containers-minimizedMinimize the admission of privileged containers in Kubernetes.4.2Enforce Pod Security Standard Baseline profile to prevent privileged containers and host namespace access.
    k8s-pod-security-host-pid-minimizedMinimize the admission of containers with hostPID in Kubernetes.4.2Enforce Pod Security Standard Baseline profile to prevent privileged containers and host namespace access.
    k8s-pod-security-host-ipc-minimizedMinimize the admission of containers with hostIPC in Kubernetes.4.2Enforce Pod Security Standard Baseline profile to prevent privileged containers and host namespace access.
    k8s-pod-security-host-network-minimizedMinimize the admission of containers with hostNetwork in Kubernetes.4.2Enforce Pod Security Standard Baseline profile to prevent privileged containers and host namespace access.
    k8s-pod-security-allow-privilege-escalation-minimizedMinimize the admission of containers with allowPrivilegeEscalation in Kubernetes.4.2Enforce Pod Security Standard Baseline profile to prevent privileged containers and host namespace access.
    gke-network-policy-enabledEnsure Network Policy is enabled in GKE clusters.4.3Use network policies to isolate traffic and restrict network access between pods.
    gke-binary-authorization-enabledEnsure Binary Authorization is enabled for GKE clusters.4.5Ensure only trusted container images can be deployed.
    k8s-seccomp-runtime-default-requiredApply RuntimeDefault seccomp profile to all workloads.4.6Apply RuntimeDefault seccomp profile to all workloads and ensure default namespace is not used.
    k8s-default-namespace-not-usedEnsure the default namespace is not used for workloads in Kubernetes.4.6Apply RuntimeDefault seccomp profile to all workloads and ensure default namespace is not used.
    gke-container-registry-iam-minimizedMinimize IAM access to Google Container Registry.5.1Ensure IAM controls and trusted image sources.
    gke-container-registry-read-only-cluster-accessEnsure GKE clusters have read-only access to Container Registry.5.1Ensure IAM controls and trusted image sources.
    k8s-trusted-images-onlyEnsure only trusted container images are used.5.1Ensure IAM controls and trusted image sources.
    gke-not-using-default-service-accountEnsure GKE nodes do not use the default service account.5.2Use dedicated service accounts with Workload Identity for GKE nodes.
    gke-workload-identity-enabledEnsure Workload Identity is enabled for GKE clusters.5.2Use dedicated service accounts with Workload Identity for GKE nodes.
    gke-secrets-encryption-kms-enabledEnsure Kubernetes Secrets are encrypted using Cloud KMS.5.3Encrypt Kubernetes secrets using Cloud KMS customer-managed keys.
    gke-metadata-server-enabledEnsure GKE Metadata Server is enabled.5.4Use GKE Metadata Server and Workload Identity for workload authentication.
    gke-cos-containerd-node-imageEnsure GKE nodes use Container-Optimized OS with containerd.5.5Ensure nodes use COS with containerd, auto-repair, auto-upgrade, release channels, and Shielded Nodes.
    gke-node-auto-repair-enabledEnsure node auto-repair is enabled for GKE node pools.5.5Ensure nodes use COS with containerd, auto-repair, auto-upgrade, release channels, and Shielded Nodes.
    gke-node-auto-upgrade-enabledEnsure node auto-upgrade is enabled for GKE node pools.5.5Ensure nodes use COS with containerd, auto-repair, auto-upgrade, release channels, and Shielded Nodes.
    gke-release-channel-enabledEnsure GKE clusters use a release channel.5.5Ensure nodes use COS with containerd, auto-repair, auto-upgrade, release channels, and Shielded Nodes.
    gke-shielded-nodes-enabledEnsure Shielded Nodes are enabled for GKE clusters.5.5Ensure nodes use COS with containerd, auto-repair, auto-upgrade, release channels, and Shielded Nodes.
    gke-shielded-nodes-integrity-monitoringEnsure integrity monitoring is enabled for Shielded Nodes.5.5Ensure nodes use COS with containerd, auto-repair, auto-upgrade, release channels, and Shielded Nodes.
    gke-shielded-nodes-secure-bootEnsure Secure Boot is enabled for Shielded Nodes.5.5Ensure nodes use COS with containerd, auto-repair, auto-upgrade, release channels, and Shielded Nodes.
    gke-vpc-flow-logs-intranode-visibilityEnsure intranode visibility and VPC flow logs are enabled.5.6Configure VPC-native clusters, private endpoints/nodes, authorized networks, and intranode visibility.
    gke-vpc-native-cluster-requiredEnsure GKE clusters are VPC-native.5.6Configure VPC-native clusters, private endpoints/nodes, authorized networks, and intranode visibility.
    gke-control-plane-authorized-networks-enabledEnsure authorized networks are enabled for the control plane.5.6Configure VPC-native clusters, private endpoints/nodes, authorized networks, and intranode visibility.
    gke-private-endpoint-enabledEnsure GKE clusters use private endpoints.5.6Configure VPC-native clusters, private endpoints/nodes, authorized networks, and intranode visibility.
    gke-private-nodes-enabledEnsure GKE clusters use private nodes.5.6Configure VPC-native clusters, private endpoints/nodes, authorized networks, and intranode visibility.
    gke-worker-node-firewall-configuredEnsure firewall rules are configured for worker nodes.5.6Configure VPC-native clusters, private endpoints/nodes, authorized networks, and intranode visibility.
    gke-google-managed-ssl-certificatesUse Google-managed SSL certificates for load balancers.5.6Configure VPC-native clusters, private endpoints/nodes, authorized networks, and intranode visibility.
    gke-logging-monitoring-enabledEnsure Cloud Logging and Cloud Monitoring are enabled for GKE.5.7Enable Cloud Logging, Cloud Monitoring, and auditd logging.
    gke-linux-auditd-logging-enabledEnsure Linux auditd logging is enabled for GKE nodes.5.7Enable Cloud Logging, Cloud Monitoring, and auditd logging.
    gke-client-certificate-auth-disabledEnsure client certificate authentication is disabled.5.8Disable client certificate authentication, enable Google Groups for RBAC, and disable legacy ABAC.
    gke-google-groups-rbac-enabledEnable Google Groups for RBAC in GKE.5.8Disable client certificate authentication, enable Google Groups for RBAC, and disable legacy ABAC.
    gke-legacy-abac-disabledEnsure legacy ABAC is disabled in GKE clusters.5.8Disable client certificate authentication, enable Google Groups for RBAC, and disable legacy ABAC.
    gke-cmek-persistent-disksUse customer-managed encryption keys for persistent disks.5.9Use customer-managed encryption keys (CMEK) for persistent and boot disks.
    gke-cmek-boot-disksUse customer-managed encryption keys for boot disks.5.9Use customer-managed encryption keys (CMEK) for persistent and boot disks.
    gke-web-ui-disabledEnsure the Kubernetes Dashboard (Web UI) is disabled.5.10Disable Kubernetes Dashboard, avoid alpha clusters, and enable security posture.
    gke-alpha-clusters-not-productionEnsure alpha clusters are not used in production.5.10Disable Kubernetes Dashboard, avoid alpha clusters, and enable security posture.
    gke-security-posture-enabledEnsure GKE Security Posture is enabled.5.10Disable Kubernetes Dashboard, avoid alpha clusters, and enable security posture.
      Neo just got smarter about infrastructure policy automation