parts/k8s/addons/audit-policy.yaml (46 lines of code) (raw):
apiVersion: audit.k8s.io/v1
kind: Policy
{{- if ShouldEnforceKubernetesDisaStig}}
{{- /* STIG Rule ID: SV-242403r879525_rule */}}
rules:
- level: RequestResponse
{{else}}
omitStages:
- RequestReceived
rules:
- level: RequestResponse
resources:
- group: ""
resources: ["pods"]
- level: Metadata
resources:
- group: ""
resources: ["pods/log", "pods/status"]
- level: None
users: ["system:kube-proxy"]
verbs: ["watch"]
resources:
- group: ""
resources: ["endpoints", "services"]
- level: None
userGroups: ["system:authenticated"]
nonResourceURLs:
- /api*
- /version
- level: Request
resources:
- group: ""
resources: ["configmaps"]
namespaces: ["kube-system"]
- level: Request
resources:
- group: ""
resources: ["secrets"]
- level: Request
resources:
- group: ""
- group: extensions
- level: Metadata
omitStages:
- RequestReceived
{{- end}}