Chapter 3. Managing compliance


3.1. Compliance feature overview

The compliance feature ensures that your Kubernetes clusters adhere to industry standards and regulatory requirements. It provides automated compliance checks that enable you to continuously monitor your clusters against predefined benchmarks such as CIS, PCI-DSS, HIPAA, and so on.

The feature includes detailed reports and remediation guidance to help administrators quickly identify and resolve compliance issues. You can view the compliance results associated with your cluster by using the compliance feature in the Red Hat Advanced Cluster Security for Kubernetes (RHACS) portal.

The compliance feature summarizes information into the following sections:

  • Dashboard, formerly known as Compliance 1.0, summarizes the compliance information collected from all your clusters. It covers workload and infrastructure compliance.

    Important

    By running a compliance scan in RHACS, you can monitor the entire Kubernetes infrastructure and workloads and ensure that they meet the required standards. You can use the compliance dashboard for filtering and detailed reporting.

    For more information, see Monitoring workload and cluster compliance.

  • Schedules and Coverage (Tech preview), formerly known as Compliance 2.0, summarizes the compliance information in a single interface after the scheduled scans by using the Compliance Operator.

    Important

    If you have Red Hat OpenShift clusters with the Compliance Operator installed, you can create and manage compliance scan schedules directly in RHACS on the schedules page. The coverage page shows you the scan results associated with a benchmark and profile in a single interface.

    For more information, see Scheduling compliance scans and assessing profile compliance (Technology preview).

3.1.1. Compliance assessment and reporting by using RHACS

On the dashboard page, you can assess and report on the compliance of your containerized infrastructure and workloads with the applicable technical controls from a range of security and regulatory frameworks.

You can run out-of-the-box compliance scans based on the following industry standards:

  • Center for Internet Security (CIS) Benchmarks for Kubernetes
  • Health Insurance Portability and Accountability Act (HIPAA)
  • National Institute of Standards and Technology (NIST) Special Publication 800-190
  • NIST Special Publication 800-53
  • Payment Card Industry Data Security Standard (PCI DSS)
  • OpenShift Compliance Operator Profiles: The Compliance Operator evaluates the compliance of both the OpenShift Container Platform Kubernetes API resources and the nodes running the cluster. There are several profiles available as part of the Compliance Operator installation.

    For more information about the available profiles, see Supported compliance profiles.

By scanning your environment based on these standards, you can:

  • Evaluate your infrastructure for regulatory compliance.
  • Harden your Kubernetes orchestrator.
  • Understand and manage the overall security posture of your environment.
  • Get a detailed overview of the compliance status of clusters, namespaces, and nodes.

3.2. Monitoring workload and cluster compliance

By performing compliance scans, you can check the compliance status of your entire infrastructure in RHACS. You can view the results in the compliance dashboard, where you can filter data and monitor compliance status across clusters, namespaces and nodes.

By generating detailed compliance reports and focusing on specific standards, controls and industry benchmarks, you can track and share the compliance status of your environment, and ensure that your infrastructure meets the required compliance standards.

3.2.1. Checking the compliance status of your infrastructure

By performing a compliance scan, you can check the compliance status of your entire infrastructure for all compliance standards. When you run a compliance scan, Red Hat Advanced Cluster Security for Kubernetes (RHACS) creates a data snapshot of your environment. The data snapshot includes alerts, images, network policies, deployments, and related host-based data.

Central collects the host-based data from Sensors running in your clusters. Central then collects further data from the compliance container running in each Collector pod.

The compliance container collects the following data about your environment:

  • Configurations for the container daemon, container runtime and container image.
  • Information about container networks.
  • Command-line arguments and processes for the container runtime, Kubernetes, and OpenShift Container Platform.
  • Permissions for specific file paths.
  • Configuration files for Kubernetes and OpenShift Container Platform core services.
  • After data collection is complete, Central checks the data to determine the results. You can view the results in the compliance dashboard and create compliance reports based on the results.
Note
  • The following terms are associated with a compliance scan:

    • Control describes a single line item in an industry or regulatory standard that an auditor uses to evaluate an information system for compliance with that standard. RHACS verifies evidence of compliance with a single control by performing one or more checks.
    • Check is the single test performed during a single control assessment.
  • Some controls have multiple checks associated with them. If one of the associated checks for a control fails, the entire control state is marked as Fail.

Procedure

  1. In the RHACS portal, click Compliance Dashboard.
  2. Optional: By default, information on all standards is displayed in the compliance results.

    To display information about specific standards only, perform the following steps:

    1. Click Manage standards.
    2. By default, all standards are selected. Clear the checkbox for any specific standard that you do not want to display.
    3. Click Save.

      Standards that are not selected do not appear in the dashboard display, including the widgets, in the compliance results tables accessible from the dashboard, and in the PDF files created by using the Export button. However, when exporting the results as a CSV file, all default standards are included.

  3. Click Scan environment.

    Note

    Scanning the entire environment takes about 2 minutes to complete. This time might vary depending on the number of clusters and nodes in your environment.

Verification

  1. In the RHACS portal, click Configuration Management.
  2. In the CIS Kubernetes v1.5 widget, click Scan.
  3. RHACS displays a message which indicates that a compliance scan is in progress.

3.2.2. Viewing the compliance standards across your environment

The compliance dashboard gives you an overview of the compliance standards in all clusters, namespaces, and nodes in your environment, including charts and options to investigate potential compliance issues.

You can view the compliance scan results for an individual cluster, namespace, or node. You can also generate reports on the compliance status of your containerized environment.

Procedure

  • In the RHACS portal, click Compliance Dashboard.

    Note

    When you open the compliance dashboard for the first time, you see the dashboard is empty. Perform a compliance scan to fill the dashboard with data.

3.2.3. Compliance dashboard overview

After you have performed a compliance scan, the compliance dashboard displays the results as the compliance status for your environment. You can view compliance violations directly from the dashboard. To find out if your environment is compliant against specific benchmarks, filter the detailed view and drill down into the compliance standards.

You can use shortcuts to check the compliance status of clusters, namespaces, and nodes, which are located at the upper right of your compliance dashboard. Clicking these shortcuts, you can view the compliance snapshot and generate reports on the overall compliance of your clusters, namespaces, or nodes.

3.2.3.1. Viewing the compliance status for clusters

By viewing the compliance status for clusters, you can monitor and ensure that your clusters adhere to the required compliance standards.

You can view the compliance status for all clusters or an individual cluster in the compliance dashboard.

Procedure

  • To view the compliance status for all clusters in your environment:

    • In the RHACS portal, click Compliance Dashboard clusters tab.
  • To view the compliance status for a specific cluster in your environment, perform the following steps:

    • In the RHACS portal, click Compliance Dashboard.
    • Look for the Passing standards by cluster widget.
    • In this widget, click a cluster name to view its compliance status.

3.2.3.2. Viewing the compliance status for namespaces

By viewing the compliance status for namespaces, you can monitor and ensure that each namespace adheres to the required compliance standards.

You can view the compliance status for all namespaces or a single namespace in the compliance dashboard.

Procedure

  • To view the compliance status for all namespaces in your environment:

    • In the RHACS portal, click Compliance Dashboard namespaces tab.
  • To view the compliance status for a specific namespace in your environment, perform the following steps:

    • In the RHACS portal, click Compliance Dashboard namespaces tab.
    • In the Namespaces table, click a namespace. A side panel opens, which is located on the right side.
    • In the side panel, click the name of the namespace to view its compliance status.

3.2.3.3. Viewing the compliance status for a specific standard

By viewing the compliance status for a specific standard, you can ensure that your environment adheres to industry and regulatory compliance requirements.

Red Hat Advanced Cluster Security for Kubernetes (RHACS) supports NIST, PCI DSS, NIST, HIPAA, and CIS for Kubernetes compliance standards. You can view all the compliance controls for a single compliance standard.

Procedure

  1. In the RHACS portal, click Compliance Dashboard.
  2. Look for the Passing standards across clusters widget.
  3. Click a standard to view information about all the controls associated with that standard.

Additional resources

3.2.3.4. Viewing the compliance status for a specific control

By viewing the compliance status for a specific control, you can ensure that your environment meets detailed compliance requirements.

You can view the compliance status for a specific control for a selected standard.

Procedure

  1. In the RHACS portal, click Compliance Dashboard.
  2. Look for the Passing standards by cluster widget.
  3. Click a standard to view information about all the controls associated with that standard.
  4. In the Controls table, click a control. A side panel opens, which is located on the right side.
  5. In the side panel, click the name of the control to view its details.

3.2.4. Limiting the amount of data visible in the compliance dashboard

By filtering the compliance data, you can focus your attention on a subset of clusters, industry standards, passed or failed controls, and limit the amount of data visible in the compliance dashboard.

Procedure

  1. In the RHACS portal, click Compliance Dashboard.
  2. Click either the clusters, namespaces, or nodes tab to open the details page.
  3. Enter your filtering criteria in the search bar, and then click Enter.

3.2.5. Tracking the compliance status of your environment

By generating compliance reports, you can keep a track of the compliance status of your environment. You can use these reports to convey compliance status across various industry mandates to other stakeholders.

You can generate the following reports:

  • Executive reports that focus on the business aspect and include charts and a summary of the compliance status in PDF format.
  • Evidence reports that focus on the technical aspect and contain detailed information in CSV format.

Procedure

  1. In the RHACS portal, click Compliance Dashboard.
  2. Click the Export tab to do any of the following tasks:

    • To generate an executive report, select Download Page as PDF.
    • To generate an evidence report, select Download Evidence as CSV.

      Tip

      The Export option appears on all compliance pages and filtered views.

3.2.5.1. Evidence reports

You can export comprehensive compliance-related data from Red Hat Advanced Cluster Security for Kubernetes (RHACS) in CSV format as an evidence report. This evidence report contains detailed information about the compliance assessment, and is tailored for technical roles, such as compliance auditors, DevOps engineers, or security practitioners.

An evidence report contains the following information:

CSV fieldDescription

Standard

The compliance standard, for example, CIS Kubernetes.

Cluster

The name of the assessed cluster.

Namespace

The name of the namespace or project where the deployment exists.

Object Type

The Kubernetes entity type of the object. For example, node, cluster, DaemonSet, Deployment, or StaticPod.

Object Name

The name of the object, which is a Kubernetes systems-generated string that uniquely identify objects. For example, gke-setup-dev21380-default-pool-8e086a77-1jfq.

Control

The control number as it appears in the compliance standard.

Control Description

Description about the compliance check that the control carries out.

State

Whether the compliance check passed or failed.

Evidence

The explanation about why a specific compliance check failed or passed.

Assessment Time

The time and date when you ran the compliance scan.

3.2.6. Supported benchmark versions

Red Hat Advanced Cluster Security for Kubernetes (RHACS) supports compliance checks against the following industry standards and regulatory frameworks:

BenchmarkSupported version

CIS Benchmark (Center for Internet Security) for Kubernetes

CIS Kubernetes v1.5.0

HIPAA (Health Insurance Portability and Accountability Act)

HIPAA 164

NIST (National Institute of Standards and Technology)

NIST Special Publication 800-190 and 800-53 Rev. 4

PCI DSS (Payment Card Industry Data Security Standard)

PCI DSS 3.2.1

3.3. Scheduling compliance scans and assessing profile compliance (Technology preview)

Important

Scheduling compliance scans and assessing profile compliance is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

You can create and manage compliance scan schedules on the schedules page that meet your operational needs. You can only have one schedule that scans the same profile on the same cluster.

By viewing and filtering the scan results on the coverage page, you can monitor the compliance status across all clusters.

3.3.1. Customizing and automating your compliance scans

By creating a compliance scan schedule, you can customize and automate your compliance scans to align with your operational requirements.

Note

You can only have one schedule that scans the same profile on the same cluster. This means that you cannot create multiple scan schedules for the same profile on a single cluster.

Prerequisites

  • You have installed the Compliance Operator.

    For more information about how to install the Compliance Operator, see "Using the Compliance Operator with Red Hat Advanced Cluster Security for Kubernetes".

    Note
    • Currently, the compliance feature and the Compliance Operator evaluate only infrastructure and platform compliance.
    • The compliance feature requires the Compliance Operator to be running and does not support Amazon Elastic Kubernetes Service (EKS).

Procedure

  1. In the RHACS portal, click Compliance Schedules.
  2. Click Create scan schedule.
  3. In the Create scan schedule page, provide the following information:

    • Name: Enter a name to identify different compliance scans.
    • Description: Specify the reason for each compliance scan.
    • Schedule: Adjust the scan schedule to fit your required schedule:

      • Frequency: From the drop-down list, select how often you want to perform the scan.

        The following values are associated with how often you want to perform the scan:

        • Daily
        • Weekly
        • Monthly
      • On day(s): From the list, select one or more days of the week on which you want to perform the scan.

        The following values are associated with the days of the week on which you want to perform the scan:

        • Monday
        • Tuesday
        • Wednesday
        • Thursday
        • Friday
        • Saturday
        • Sunday
        • The first of the month
        • The middle of the month

          Note

          These values are only applicable if you specify the frequency of scan as Weekly or Monthly.

      • Time: Start to type the time in hh:mm at which you want to run the scan. From the list that is displayed, select a time.
  4. Click Next.
  5. In the Clusters page, select one or more clusters that you want to include in the scan.
  6. Click Next.
  7. In the Profiles page, select one or more profiles that you want to include in the scan.
  8. Click Next.
  9. Optional: To configure email delivery destinations for manually triggered reports, perform the following steps:

    Note

    You can add one or more delivery destinations.

    1. Expand Add delivery destination.
    2. In the Delivery destination page, provide the following information:

      • Email notifier: Select an email notifier from the drop-down list.

        Optional: To configure the setting for a new email notifier integration, perform the following steps:

        1. From Select a notifier drop-down list, click Create email notifier.
        2. In the Create email notifier page, provide the following information:

          • Integration name: Enter a unique name for the email notifier. This name helps you identify and manage this specific email notifier configuration.
          • Email server: Specify the address of the SMTP server that you want to use to send the emails.
          • Username: Enter the username that is required for authentication with the SMTP server. This is often the email address used for sending the emails.
          • Password: Enter the password associated with the SMTP username. This password is used for authentication with the SMTP server.
          • From: This address usually represents the sender of the emails and is visible to the recipients. This is optional.
          • Sender: Enter the name of the sender, which is displayed together with the From email address. This name helps recipients identify who sent the email.
          • Default recipient: Enter the default email address that should receive the notifications if no specific recipient is specified. This ensures that there is always a recipient for the emails.
          • Annotation key for recipient: Specify the annotation key to define a recipient that you want to notify about the policy violations related to a specific deployment or namespace. This is optional.
          • Optional: Select the Enable unauthenticated SMTP checkbox, if your SMTP server does not require authentication. This is not recommended due to security reasons.
          • Optional: Select the Disable TLS certificate validation (insecure) checkbox, if you want to disable TLS certificate validation. This is not recommended due to security reasons.
          • Optional: In the Use STARTTLS (requires TLS to be disabled) field, select the type of STARTTLS for securing the connection to the SMTP server from the drop-down list.

            Important

            To use this option, you must disable TLS certificate validation.

            The following values are associated with the type of STARTTLS for securing the connection to the SMTP server:

            • Disabled

              Data is not encrypted.

            • Plain

              Encodes username and password in base64.

            • Login

              Sends username and password as separate base64-encoded strings for added security.

        3. Click Save integration.
      • Distribution list: Enter one or more comma-separated email addresses of the recipients who should receive the report.
      • Email template: The default template is automatically applied.

        Optional: To customize the email subject and body as needed, perform the following steps:

        1. Click the pencil icon.
        2. In the Edit email template page, provide the following information:

          • Email subject: Enter the desired subject line for the email. This subject is displayed in the recipient’s inbox and should clearly indicate the purpose of the email.
          • Email body: Compose the text of the email. This is the main content of the email and can include text, placeholders for dynamic content and any formatting necessary to get your message across effectively.
        3. Click Apply.
  10. Click Next.
  11. Review your scan configuration, and then click Save.

Verification

  1. In the RHACS portal, click Compliance Schedules.
  2. Select the compliance scan you have created.
  3. In the Clusters section, verify that the operator status is healthy.
  4. Optional: To edit the scan schedule, perform the following steps:

    1. From the Actions drop-down list, select Edit scan schedule.
    2. Make your changes.
    3. Click Save.
  5. Optional: To manually send a scan report:

    Note

    You can only send a scan report manually if you have configured an email delivery destination.

    • From the Actions drop-down list, select Send report.

      You receive a confirmation that you have requested to send a report.

3.3.2. Assessing the profile compliance across clusters

By viewing the coverage page, you can assess the profile compliance for nodes and platform resources across clusters.

Prerequisites

  • You have installed the Compliance Operator.

    For more information about how to install the Compliance Operator, see "Using the Compliance Operator with Red Hat Advanced Cluster Security for Kubernetes".

    Note
    • Currently, the compliance feature and the Compliance Operator evaluate only infrastructure and platform compliance.
    • The compliance feature requires the Compliance Operator to be running and does not support Amazon Elastic Kubernetes Service (EKS).
  • You have created a compliance scan schedule.

    For more information about how to create a compliance scan schedule, see "Customizing and automating your compliance scans".

Procedure

  • In the RHACS portal, click Compliance Coverage.

3.3.3. Coverage page overview

When you view the coverage page and apply a filter to a schedule, all results are filtered accordingly. This filter remains active for all coverage pages until you delete it. You can always view the results based on a single profile.

You can select profiles grouped according to their associated benchmarks by using the toggle group. You calculate the compliance percentage based on the number of passed checks in relation to the total number of checks.

The Checks view lists the profile checks and enables you to easily navigate and understand your compliance status.

The profile check information is organized into the following groups:

  • Check: The name of the profile check.
  • Controls: Shows the various controls associated with each check.
  • Fail status: Shows the checks that have failed and require your attention.
  • Pass status: Shows the checks that have been successfully passed.
  • Manual status: Shows the checks that require a manual review because additional organizational or technical knowledge is required that you cannot automate.
  • Other status: Shows the checks with a status other than pass or fail, such as warnings or informational statuses.
  • Compliance: Shows the overall compliance status and helps you to ensure that your environment meets the required standards.

The Clusters view lists the clusters and enables you to effectively monitor and manage your clusters.

The cluster information is organized into the following groups:

  • Cluster: The name of the cluster.
  • Last scanned: Indicates when the individual clusters were last scanned.
  • Fail status: Shows the clusters whose scan has failed and which require your attention.
  • Pass status: Shows the clusters that have successfully passed all checks.
  • Manual status: Shows the checks that require a manual review because additional organizational or technical knowledge is required that you cannot automate.
  • Other status: Shows the clusters that have a status other than pass or fail, such as warnings or informational alerts.
  • Compliance: Shows the overall compliance status of your clusters and helps you to ensure that they meet the required standards.

3.3.4. Monitoring and analyzing the health of your clusters

By viewing the status of a profile check, you can efficiently monitor and analyze the health of your clusters.

Important

Wait until the Compliance Operator returns the scan results. It might take a few minutes.

Procedure

  1. In the RHACS portal, click Compliance Coverage.
  2. Select a cluster to view the details of the individual scans.
  3. Optional: Enter the name of the profile check in the Filter by keyword box to view the status.
  4. Optional: From the Compliance status drop-down list, select one or more statuses by using which you want to filter the scan details.

    The following values are associated with how you want to filter the scan details:

    • Pass
    • Fail
    • Error
    • Info
    • Manual
    • Not Applicable
    • Inconsistent

3.3.5. Compliance scan status overview

By understanding the compliance scan status, you can manage the overall security posture of your environment.

StatusDescription

Fail

The compliance check failed.

Pass

The compliance check passed.

Not Applicable

Skipped the compliance check because it was not applicable.

Info

The compliance check gathered data, but RHACS could not make a pass or fail determination.

Error

The compliance check failed due to a technical issue.

Manual

Manual intervention is required to ensure compliance.

Inconsistent

The compliance scan data is inconsistent, and requires closer inspection and targeted resolution.

Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.