Closed sluetze closed 2 weeks ago
Fore sentence 1, we could verify security on the relevant components, that are associated to that process (relevant config files on nodes and control plane, TLS config on both sides:
For sentence 2, we could check, if the File Integrity Operator is installed, rule:
Implementation completed in https://github.com/ComplianceAsCode/content/pull/11659
During rebasing, I accidentially closed the previous PR. For better reviewability, I created a new PR: https://github.com/ComplianceAsCode/content/pull/12153
/close as upstream is merged
This is already achieved natively by using RHCOS.
Nodes need to authenticate with a certificate.