Under active development Content is continuously updated and improved

V-242462The Kubernetes API Server must be set to audit log max size.

CAT II - Medium
CNTR-K8-003290

>Control Description

The Kubernetes API Server must be set for enough storage to retain log information over the period required. When audit logs are large in size, the monitoring service for events becomes degraded. The function of the maximum log file size is to set these limits.

>Check Content

Change to the /etc/kubernetes/manifests/ directory on the Kubernetes Control Plane.

$grep -i audit-log-maxsize *

If the setting "--audit-log-maxsize" is not set in the Kubernetes API Server manifest file or it is set to less than "100", this is a finding.

>Remediation

Edit the Kubernetes API Server manifest file in the /etc/kubernetes/manifests directory on the Kubernetes Control Plane. Set the value of "--audit-log-maxsize" to a minimum of "100".

>CCI References

Control Correlation Identifiers (CCIs) map STIG findings to NIST 800-53 controls.

>Cross-Framework Mappings

NIST SP 800-53 r5

via DISA CCI List

Ask AI

Configure your API key to use AI features.