You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/cis-ubuntu.md
+32-31Lines changed: 32 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,12 +3,13 @@ title: Azure Kubernetes Service (AKS) Ubuntu image alignment with Center for Int
3
3
description: Learn how AKS applies the CIS benchmark
4
4
ms.topic: article
5
5
ms.date: 04/19/2023
6
+
ms.author: mgoedtel
6
7
ms.reviewer: mattmcinnes
7
8
---
8
9
9
10
# Azure Kubernetes Service (AKS) Ubuntu image alignment with Center for Internet Security (CIS) benchmark
10
11
11
-
As a secure service, Azure Kubernetes Service (AKS) complies with SOC, ISO, PCI DSS, and HIPAA standards. This article covers the security OS configuration applied to Ubuntu imaged used by AKS. This security configuration is based on the Azure Linux security baseline which aligns with CIS benchmark. For more information about AKS security, see Security concepts for applications and clusters in Azure Kubernetes Service (AKS). For more information about AKS security, see [Security concepts for applications and clusters in Azure Kubernetes Service (AKS)](./concepts-security.md). For more information on the CIS benchmark, see [Center for Internet Security (CIS) Benchmarks][cis-benchmarks]. For more information on the Azure security baselines for Linux, see [Linux security baseline][linux-security-baseline].
12
+
As a secure service, Azure Kubernetes Service (AKS) complies with SOC, ISO, PCI DSS, and HIPAA standards. This article covers the security OS configuration applied to Ubuntu imaged used by AKS. This security configuration is based on the Azure Linux security baseline, which aligns with CIS benchmark. For more information about AKS security, see Security concepts for applications and clusters in Azure Kubernetes Service (AKS). For more information about AKS security, see [Security concepts for applications and clusters in Azure Kubernetes Service (AKS)](./concepts-security.md). For more information on the CIS benchmark, see [Center for Internet Security (CIS) Benchmarks][cis-benchmarks]. For more information on the Azure security baselines for Linux, see [Linux security baseline][linux-security-baseline].
12
13
13
14
## Ubuntu LTS 18.04
14
15
@@ -29,7 +30,7 @@ The following are the results from the [CIS Ubuntu 18.04 LTS Benchmark v2.1.0][c
29
30
30
31
Recommendations can have one of the following reasons:
31
32
32
-
**Potential Operation Impact* - Recommendation was not applied because it would have a negative effect on the service.
33
+
**Potential Operation Impact* - Recommendation wasn't applied because it would have a negative effect on the service.
33
34
**Covered Elsewhere* - Recommendation is covered by another control in Azure cloud compute.
34
35
35
36
The following are CIS rules implemented:
@@ -70,7 +71,7 @@ The following are CIS rules implemented:
0 commit comments