UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Audit logging must be enabled on MKE.


Overview

Finding ID Version Rule ID IA Controls Severity
V-260914 CNTR-MK-000220 SV-260914r966099_rule Medium
Description
Enabling audit logging on MKE enhances security, supports compliance efforts, provides user accountability, and offers valuable insights for incident response and operational management. It is an essential component of maintaining a secure, compliant, and well-managed Kubernetes environment. Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one.
STIG Date
Mirantis Kubernetes Engine Security Technical Implementation Guide 2024-06-17

Details

Check Text ( C-64643r966097_chk )
Check auditing configuration level for MKE nodes and controller:

Log in to the MKE web UI and navigate to admin >> Admin Settings >> Logs & Audit Logs.

If "AUDIT LOG LEVEL" is not set to "Request", this is a finding.

If "DEBUG LEVEL" is set to "ERROR", this is a finding.
Fix Text (F-64551r966098_fix)
Log in to the MKE web UI and navigate to admin >> Admin Settings >> Logs & Audit Logs.

In the "Configure Audit Log Level" section, select "Request"

In the "Configure Global Log Level" section, select "INFO" or "DEBUG".
Note: The recommended setting is "INFO".

Click "Save".