💼 6.10 Other Cluster Configurations
- ID:
/frameworks/cis-gke-v1.0.0/06/10
Description​
This section contains recommendations relating to any remaining security-related cluster configurations in GKE.
Similar​
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 6.10.1 Ensure Kubernetes Web UI is Disabled (Scored) | no data | ||||
| 💼 6.10.2 Ensure that Alpha clusters are not used for production workloads (Scored) | no data | ||||
| 💼 6.10.3 Ensure Pod Security Policy is Enabled and set as appropriate (Not Scored) | no data | ||||
| 💼 6.10.4 Consider GKE Sandbox for running untrusted workloads (Not Scored) | no data | ||||
| 💼 6.10.5 Ensure use of Binary Authorization (Scored) | no data | ||||
| 💼 6.10.6 Enable Cloud Security Command Center (Cloud SCC) (Not Scored) | no data |