Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • Overview
    • Security Deck workspaces
    • Alerts in Security Deck
      • Overview
      • Yandex Cloud basic security rules
      • Cloud infrastructure security standard Yandex Cloud
      • CIS Benchmark™ requirements for Kubernetes
    • Data Security Posture Management (DSPM)
    • Kubernetes® Security Posture Management (KSPM)
    • Cloud Infrastructure Entitlement Management (CIEM)
    • Cloud Security Posture Management (CSPM)
    • Vulnerability Management (VM)
    • Access Transparency
    • AI assistant
    • Quotas and limits
  • Pricing policy
  • Audit Trails events
  • Release notes
  1. Concepts
  2. Compliance UI
  3. CIS Benchmark™ requirements for Kubernetes

CIS Benchmark™ requirements for Kubernetes

Written by
Yandex Cloud
Updated at April 13, 2026

Note

This feature is at the Preview stage.

This rule set contains CIS Kubernetes Benchmark security recommendations for the components that run on Kubernetes worker nodes.

The rule set only lists automatic checks from the section 4. Worker Nodes:

Rule Security standard requirement Rule check ID
Restrictive permissions for Kubelet service file are set 4.1.1 Restrictive permissions for Kubelet service file are set kspm.host-security.kubelet-service-file-perm-600
Kubelet service file ownership is set to root:root 4.1.2 Kubelet service file ownership is set to root:root kspm.host-security.kubelet-service-file-owner-root
Restrictive permissions for kubeconfig configuration file are set 4.1.5 Restrictive permissions for the --kubeconfig kubelet.conf file are set kspm.host-security.kubelet-conf-600
The owner of kubeconfig configuration file is set to root:root 4.1.6 The owner of the --kubeconfig kubelet.conf file is set to root:root kspm.host-security.kubelet-conf-owner-root
Restrictive permissions for Kubelet configuration file are set 4.1.9 Restrictive permissions for the Kubelet config.yaml configuration file are set kspm.host-security.kubelet-config-permissions-600
The owner of Kubelet configuration file is set to root:root 4.1.10 Kubelet config.yaml configuration file ownership is set to root:root kspm.host-security.kubelet-config-owner-root
Requests from anonymous users to Kubelet server are disabled 4.2.1 The --anonymous-auth argument is set to false kspm.host-security.anonymous-auth-false
Only explicitly authorized requests to Kubelet server are allowed 4.2.2 The --authorization-mode argument is not set to AlwaysAllow kspm.host-security.auth-mode-not-always-allow
Kubelet authentication via certificates is enabled 4.2.3 The --client-ca-file argument is set to the proper location kspm.host-security.client-ca-file-set
Kubelet is allowed to manage iptables 4.2.6 The --make-iptables-util-chains argument is set to true kspm.host-security.make-iptables-util-chains-true
Kubelet client certificate rotation is enabled 4.2.10 The --rotate-certificates argument is not set to false kspm.host-security.rotate-certs-not-false

Was the article helpful?

Previous
Cloud infrastructure security standard Yandex Cloud
Next
Data Security Posture Management (DSPM)
© 2026 Direct Cursus Technology L.L.C.