-
Notifications
You must be signed in to change notification settings - Fork 761
Open
Description
Description of problem:
Some rules don't respect the ocp4-hypershift-cluster and ocp4-hypershift-namespace-prefix variables, so they scan the management cluster and not the guest one, thus produce incorrect results.
List of rules:
ocp4-api-server-anonymous-authocp4-api-server-oauth-https-serving-certocp4-api-server-openshift-https-serving-certocp4-api-server-profiling-protected-by-rbacocp4-api-server-tls-security-profile-custom-min-tls-versionocp4-api-server-tls-security-profile-not-oldocp4-audit-logging-enabledocp4-audit-profile-setocp4-kubelet-configure-tls-cipher-suites-ingresscontrollerocp4-ocp-allowed-registriesocp4-ocp-allowed-registries-for-importocp4-ocp-insecure-allowed-registries-for-importocp4-ocp-insecure-registriesocp4-rbac-debug-role-protects-pprofocp4-scc-limit-container-allowed-capabilitiesocp4-scheduler-profiling-protected-by-rbacocp4-scheduler-service-protected-by-rbac
SCAP Security Guide Version:
0.1.78
Operating System Version:
RHCOS 9.6.20251013-1
Steps to Reproduce:
- Create a Hypershift hosted cluster
- Set for example the audit profile to "None" on the HostedCluster
- Make sure the audit profile is not set to "None" on the management cluster
- Follow the usage docs here to run a scan: https://github.com/ComplianceAsCode/compliance-operator/blob/master/doc/usage.md#how-to-use-compliance-operator-with-hypershift-management-cluster
Actual Results:
The ocp4-audit-logging-enabled check will succeed
Expected Results:
The ocp4-audit-logging-enabled check should fail
Additional Information/Debugging Steps:
N/A
Metadata
Metadata
Assignees
Labels
No labels