Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add compliance additional fields #151

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions specs/compliance/aws-cis-1.2.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@ spec:
title: AWS CIS Foundations v1.2
description: AWS CIS Foundations
version: "1.2"
platfrom: aws
type: cis
relatedResources:
- https://www.cisecurity.org/benchmark/amazon_web_services
controls:
Expand Down
2 changes: 2 additions & 0 deletions specs/compliance/aws-cis-1.4.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@ spec:
title: AWS CIS Foundations v1.4
description: AWS CIS Foundations
version: "1.4"
platfrom: aws
type: cis
relatedResources:
- https://www.cisecurity.org/benchmark/amazon_web_services
controls:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,11 +1,13 @@
---
spec:
id: docker-cis
id: docker-cis-1.6.0
title: CIS Docker Community Edition Benchmark v1.6.0
description: CIS Docker Community Edition Benchmark
relatedResources :
- https://www.cisecurity.org/benchmark/docker
version: "1.6.0"
platfrom: docker
type: cis
controls:
- id: '4.1'
name: Ensure a user for the container has been created
Expand Down
2 changes: 2 additions & 0 deletions specs/compliance/eks-cis-1.4.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@ spec:
title: AWS EKS CIS Foundations v1.4
description: AWS EKS CIS Foundations
version: "1.4"
platfrom: eks
type: cis
relatedResources:
- https://www.cisecurity.org/benchmark/amazon_web_services
controls:
Expand Down
2 changes: 2 additions & 0 deletions specs/compliance/k8s-cis-1.23.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,8 @@ spec:
title: CIS Kubernetes Benchmarks v1.23
description: CIS Kubernetes Benchmarks
version: "1.23"
platfrom: k8s
type: cis
relatedResources:
- https://www.cisecurity.org/benchmark/kubernetes
controls:
Expand Down
2 changes: 2 additions & 0 deletions specs/compliance/k8s-nsa-1.0.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,8 @@ spec:
relatedResources :
- https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/2716980/nsa-cisa-release-kubernetes-hardening-guidance/
version: "1.0"
platfrom: k8s
type: nsa
controls:
- name: Non-root containers
description: 'Check that container is not running as root'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ spec:
relatedResources :
- https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
version: "0.1"
platfrom: k8s
type: pss
controls:
- name: HostProcess
description: "Windows pods offer the ability to run HostProcess containers which enables privileged access to the Windows node. Privileged access to the host is disallowed in the baseline policy"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ spec:
relatedResources :
- https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
version: "0.1"
platfrom: k8s
type: pss
controls:
- name: HostProcess
description: "Windows pods offer the ability to run HostProcess containers which enables privileged access to the Windows node. Privileged access to the host is disallowed in the baseline policy"
Expand Down
6 changes: 3 additions & 3 deletions specs/loader_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,11 +15,11 @@ func TestLoadSpecs(t *testing.T) {
}{
{name: "nsa spec", specName: "k8s-nsa-1.0", wantSpecPath: "./compliance/k8s-nsa-1.0.yaml"},
{name: "k8s cis bench", specName: "k8s-cis-1.23", wantSpecPath: "./compliance/k8s-cis-1.23.yaml"},
{name: "k8s pss baseline", specName: "k8s-pss-baseline-0.1", wantSpecPath: "./compliance/k8s-pss-baseline.yaml"},
{name: "k8s pss restricted", specName: "k8s-pss-restricted-0.1", wantSpecPath: "./compliance/k8s-pss-restricted.yaml"},
{name: "k8s pss baseline", specName: "k8s-pss-baseline-0.1", wantSpecPath: "./compliance/k8s-pss-baseline-0.1.yaml"},
{name: "k8s pss restricted", specName: "k8s-pss-restricted-0.1", wantSpecPath: "./compliance/k8s-pss-restricted-0.1.yaml"},
{name: "awscis1.2", specName: "aws-cis-1.2", wantSpecPath: "./compliance/aws-cis-1.2.yaml"},
{name: "awscis1.4", specName: "aws-cis-1.4", wantSpecPath: "./compliance/aws-cis-1.4.yaml"},
{name: "docker cis bench", specName: "docker-cis", wantSpecPath: "./compliance/docker-cis.yaml"},
{name: "docker cis bench", specName: "docker-cis-1.6.0", wantSpecPath: "./compliance/docker-cis-1.6.0.yaml"},
{name: "awscis1.2 by filepath", specName: "@./compliance/aws-cis-1.2.yaml", wantSpecPath: "./compliance/aws-cis-1.2.yaml"},
{name: "bogus spec", specName: "foobarbaz"},
}
Expand Down
Loading