This topic describes the different benchmarks used for scanning in Compliance Scanner for VMware Tanzu.
When configuring Compliance Scanner, you choose which benchmarks you want. Benchmarks determine which tests are run by the scanner.
Compliance Scanner offers four scanning benchmarks:
This benchmark is a subset of the full STIG benchmark.
The Base Xenial does not include the STIG tests that fail because of differences between the Xenial stemcells and standard Ubuntu Server image.
Because the removed failed tests do not threaten the security of the system, the remaining tests in the Base Xenial benchmark are a baseline for unaltered stemcells. Use this benchmark to see if the configurations have been further modified.
For information about the STIG benchmark, see STIG for Ubuntu Xenial below.
The CIS Level 1 profile is considered a base recommendation that can be implemented fairly promptly and is designed to not have an extensive performance impact. The intent of the Level 1 profile benchmark is to lower the attack surface of your organization while keeping machines usable and not hindering business functionality.
The CIS Level 2 profile is considered to be “defense in depth” and is intended for environments where security is paramount. The recommendations associated with the Level 2 profile can have an adverse effect on your organization if not implemented appropriately and with due care.
The CIS Level 1 profile is considered a base recommendation that can be implemented fairly promptly and is designed to not have an extensive performance impact. The intent of the Level 1 profile benchmark is to lower the attack surface of your organization while keeping machines usable and not hindering business functionality.
The CIS Level 2 profile is considered to be “defense in depth” and is intended for environments where security is paramount. The recommendations associated with the Level 2 profile can have an adverse effect on your organization if not implemented appropriately and with due care.
This benchmark contains tests outlined in the Ubuntu 16.04 (Xenial) Security Technical Implementation Guide (STIG) published by the Defense Information Systems Agency (DISA). This benchmark contains the full Ubuntu 16.04 (Xenial) Security Technical Implementation Guide (STIG) set of tests.
This benchmark targets a standard Ubuntu Server. When it is applied to stemcells, certain tests fail for the following reasons:
To address failures of the first type, the bundled tests have been updated to reflect the paths used by stemcells. These changes do not compromise the integrity of the tests themselves. The remaining failing tests that highlight stemcell differences can help auditors assess their security posture.
For more information about the Canonical Ubuntu 16.04 LTS STIG guide, use the following link to download a ZIP file of the Department of Defense’s documentation.
This benchmark contains tests of the published CIS Kubernetes Benchmark for Control Plane Components, etcd, and Control Plane Configuration.
This benchmark includes the CIS Level 1 and CIS Level 2 profile.
This benchmark targets TKGI clusters.
This benchmark contains tests of the published CIS Kubernetes Benchmark for Worker Nodes.
This benchmark includes the CIS Level 1 and CIS Level 2 profile.
This benchmark targets TKGI clusters.
This benchmark contains tests of the published Defense Information Systems Agency (DISA) Kubernetes Benchmark for Control Plane Components, etcd, and Control Plane Configuration.
This benchmark targets TKGI clusters.
This benchmark contains tests of the published Defense Information Systems Agency (DISA) Kubernetes Benchmark for Worker Nodes.
This benchmark targets TKGI clusters.
This benchmark contains tests outlined in the Ubuntu 22.04 (Jammy) Security Technical Implementation Guide (STIG) published by the Defense Information Systems Agency (DISA). This benchmark contains the full Ubuntu 22.04 (Jammy) Security Technical Implementation Guide (STIG) set of tests.
This benchmark targets a standard Ubuntu Server. When it is applied to stemcells, certain tests fail for the following reasons:
To address failures of the first type, the bundled tests have been updated to reflect the paths used by stemcells. These changes do not compromise the integrity of the tests themselves. The remaining failing tests that highlight stemcell differences can help auditors assess their security posture.
For more information about the Canonical Ubuntu 22.04 LTS STIG guide, use the following link to download a ZIP file of the Department of Defense’s documentation.