CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4chown -R root:root / etc/kubernetes/pki/ Audit: check_files_owner_in_dir.sh /node/etc/kubernetes/ssl Expected Result: 'true' is equal to 'true' Audit Script: #!/usr/bin/env bash # This script is chmod -R 644 /etc/ kubernetes/pki/*.crt Audit: check_files_permissions.sh /node/etc/kubernetes/ssl/!(*key).pe m Expected Result: 'true' is equal to 'true' Audit Script: #!/usr/bin/env bash # This on the master node. For example, chmod -R 600 /etc/ kubernetes/ssl/*key.pem Audit: check_files_permissions.sh /node/etc/kubernetes/ssl/*key.pem 600 Expected Result: 'true' is equal to 'true' Audit0 码力 | 132 页 | 1.12 MB | 1 年前3
Rancher CIS Kubernetes v.1.4.0 Benchmark Self
Assessmentmatch("--kubelet-client-certificate=.*").string' Returned Value: --kubelet-client-certificate=/etc/kubernetes/ssl/kube-apiserver.pem Audit ( --kubelet-client-key ) docker inspect kube-apiserver | jq -e '.[0].Args[] | match("--kubelet-client-key=.*").string' Returned Value: --kubelet-client-key=/etc/kubernetes/ssl/kube-apiserver-key.pem Result: Pass 1.1.23 Ensure that the --service-account-lookup argument is match("--service-account-key-file=.*").string' Returned Value: --service-account-key-file=/etc/kubernetes/ssl/kube-service-account- token-key.pem Result: Pass 1.1.26 - Ensure that the --etcd-certfile and0 码力 | 47 页 | 302.56 KB | 1 年前3
Apache Karaf Decanter 1.x - DocumentationSecurity (SSL) #security.protocol=SSL # SSL truststore location (Kafka broker) and password #ssl.truststore.location=${karaf.etc}/keystores/keystore.jks #ssl.truststore.password=karaf # SSL keystore (if is required) #ssl.keystore.location=${karaf.etc}/keystores/clientstore.jks #ssl.keystore.password=karaf #ssl.key.password=karaf # (Optional) SSL provider (default uses the JVM one) #ssl.provider= # (Optional) (Optional) SSL Cipher suites #ssl.cipher.suites= # (Optional) SSL Protocols enabled (default is TLSv1.2,TLSv1.1,TLSv1) #ssl.enabled.protocols=TLSv1.2,TLSv1.1,TLSv1 The configuration is similar to the0 码力 | 67 页 | 213.16 KB | 1 年前3
Apache Karaf Decanter 2.x - DocumentationSecurity (SSL) #security.protocol=SSL # SSL truststore location (Kafka broker) and password #ssl.truststore.location=${karaf.etc}/keystores/keystore.jks #ssl.truststore.password=karaf # SSL keystore (if is required) #ssl.keystore.location=${karaf.etc}/keystores/clientstore.jks #ssl.keystore.password=karaf #ssl.key.password=karaf # (Optional) SSL provider (default uses the JVM one) #ssl.provider= # (Optional) (Optional) SSL Cipher suites #ssl.cipher.suites= # (Optional) SSL Protocols enabled (default is TLSv1.2,TLSv1.1,TLSv1) #ssl.enabled.protocols=TLSv1.2,TLSv1.1,TLSv1 # (Optional) SSL Truststore type (default0 码力 | 64 页 | 812.01 KB | 1 年前3
CIS Benchmark Rancher Self-Assessment Guide - v2.4system) on the master node. For example, chown -R root:root /etc/kubernetes/ssl Audit: stat -c %U:%G /etc/kubernetes/ssl Expected result: 'root:root' is present 1.1.20 Ensure that the Kubernetes on the file location on your system) on the master node. For example, chmod -R 644 /etc/kubernetes/ssl Audit Script: check_files_permissions.sh #!/usr/bin/env bash # This script is used to ensure the "${FILES_PERMISSIONS}" echo "true" exit Audit Execution: ./check_files_permissions.sh '/etc/kubernetes/ssl/*.pem' Expected result: 'true' is present 1.1.21 Ensure that the Kubernetes PKI key file permissions0 码力 | 54 页 | 447.77 KB | 1 年前3
CIS 1.5 Benchmark - Self-Assessment Guide - Rancher v2.5system) on the master node. For example, chown -R root:root /etc/kubernetes/ssl Audit: stat -c %U:%G /etc/kubernetes/ssl Expected result: 'root:root' is present 1.1.20 Ensure that the Kubernetes on the file location on your system) on the master node. For example, chmod -R 644 /etc/kubernetes/ssl Audit Script: check_files_permissions.sh #!/usr/bin/env bash # This script is used to ensure the "${FILES_PERMISSIONS}" echo "true" exit Audit Execution: ./check_files_permissions.sh '/etc/kubernetes/ssl/*.pem' Expected result: 'true' is present 1.1.21 Ensure that the Kubernetes PKI key file permissions0 码力 | 54 页 | 447.97 KB | 1 年前3
BAETYL 0.1.6 Documentationoasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt- v3.1.1-os.html], and supports four access methods: TCP, SSL, WS, and WSS; The official module baetyl-remote-mqtt is used to bridge two MQTT Servers for message MQTT and HTTPS channels. MQTT enforces two-way authentication for SSL/TLS certificates. HTTPS enforces one-way authentication for SSL/TLS certificates. Developers can refer to this module to implement capabilities for all services. Currently supports 4 access methods: TCP, SSL (TCP + SSL), WS (Websocket) and WSS (Websocket + SSL). The MQTT protocol support is as follows: Support Connect, Disconnect0 码力 | 119 页 | 11.46 MB | 1 年前3
BAETYL 1.0.0 Documentationoasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt- v3.1.1-os.html], and supports four access methods: TCP, SSL, WS, and WSS; The official module baetyl-remote-mqtt is used to bridge two MQTT Servers for message MQTT and HTTPS channels. MQTT enforces two-way authentication for SSL/TLS certificates. HTTPS enforces one-way authentication for SSL/TLS certificates. Developers can refer to this module to implement capabilities for all services. Currently supports 4 access methods: TCP, SSL (TCP + SSL), WS (Websocket) and WSS (Websocket + SSL). The MQTT protocol support is as follows: Support Connect, Disconnect0 码力 | 135 页 | 15.44 MB | 1 年前3
BAETYL 0.1.6 Documentationsubscription and publishing functions based on the MQTT protocol, and supports four access methods: TCP, SSL, WS, and WSS; • The official module baetyl-remote-mqtt is used to bridge two MQTT Servers for message MQTT and HTTPS channels. MQTT enforces two-way authentication for SSL/TLS cer- tificates. HTTPS enforces one-way authentication for SSL/TLS certificates. Developers can refer to this module to implement Modules 17 BAETYL Documentation Currently supports 4 access methods: TCP, SSL (TCP + SSL), WS (Websocket) and WSS (Websocket + SSL). The MQTT protocol support is as follows: • Support Connect, Disconnect0 码力 | 120 页 | 7.27 MB | 1 年前3
BAETYL 1.0.0 Documentationsubscription and publishing functions based on the MQTT protocol, and supports four access methods: TCP, SSL, WS, and WSS; • The official module baetyl-remote-mqtt is used to bridge two MQTT Servers for message MQTT and HTTPS channels. MQTT enforces two-way authentication for SSL/TLS cer- tificates. HTTPS enforces one-way authentication for SSL/TLS certificates. Developers can refer to this module to implement Modules 17 BAETYL Documentation Currently supports 4 access methods: TCP, SSL (TCP + SSL), WS (Websocket) and WSS (Websocket + SSL). The MQTT protocol support is as follows: • Support Connect, Disconnect0 码力 | 145 页 | 9.31 MB | 1 年前3
共 206 条
- 1
- 2
- 3
- 4
- 5
- 6
- 21













