<?xml version="1.0" encoding="UTF-8"?>
<Benchmark xmlns="http://checklists.nist.gov/xccdf/1.2"
           xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
           id="xccdf_org.cisecurity.benchmarks_benchmark_kubernetes"
           resolved="true">
  
  <status date="2026-05-08">accepted</status>
  <title>CIS Kubernetes Benchmark v1.8.0</title>
  <description>
    This benchmark provides prescriptive guidance for establishing a secure configuration
    posture for Kubernetes v1.28.0. This guide was tested against Kubernetes
    running on Linux.
  </description>
  <version>1.8.0</version>
  
  <Profile id="xccdf_org.cisecurity.benchmarks_profile_Level_2_-_Master_Node">
    <title>CIS Kubernetes Benchmark Level 2 - Master Node</title>
    <description>
      This profile contains configuration checks that align to the CIS Kubernetes Benchmark
      Level 2 for master nodes.
    </description>
  </Profile>
  
  <TestResult id="xccdf_org.kube-bench_testresult_xccdf_org.cisecurity.benchmarks_profile_Level_2_-_Master_Node"
              start-time="2026-05-08T18:16:56.232025"
              end-time="2026-05-08T18:21:56.232025"
              version="1.2"
              test-system="cpe:/a:aquasecurity:kube-bench:0.7.0">
    
    <benchmark href="/etc/kube-bench/cfg/cis-1.8/benchmark.yml"
               id="xccdf_org.cisecurity.benchmarks_benchmark_kubernetes"/>
    
    <title>kube-bench Scan Result - Kubernetes control plane node running K8s 1.28</title>
    
    <identity authenticated="true" privileged="true">root</identity>
    
    <profile idref="xccdf_org.cisecurity.benchmarks_profile_Level_2_-_Master_Node"/>
    
    <target>k8s-control-01.example.com</target>
    <target-address>192.168.2.101</target-address>
    <target-facts>
      <fact name="urn:xccdf:fact:asset:identifier:host_name" type="string">k8s-control-01.example.com</fact>
      <fact name="urn:xccdf:fact:asset:identifier:ipv4" type="string">192.168.2.101</fact>
      <fact name="urn:xccdf:fact:asset:identifier:platform" type="string">Kubernetes</fact>
      <fact name="urn:xccdf:fact:asset:identifier:k8s_version" type="string">1.28.0</fact>
      <fact name="urn:xccdf:fact:asset:identifier:node_type" type="string">master</fact>
    </target-facts>
    
    <platform idref="cpe:/a:kubernetes:kubernetes:1.28.0"/>
    
    <score system="urn:xccdf:scoring:default" maximum="100.000000">92.0</score>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_anonymous_auth"
                 time="2026-05-08T18:17:05.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.3.9</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:533" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_basic_auth"
                 time="2026-05-08T18:17:18.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.4.20</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:521" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_token_auth"
                 time="2026-05-08T18:17:31.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.9.12</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:161" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_kubelet_https"
                 time="2026-05-08T18:17:37.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.6.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:525" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_kubelet_client_certificate"
                 time="2026-05-08T18:17:47.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.4.19</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:923" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_kubelet_certificate_authority"
                 time="2026-05-08T18:18:01.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.4.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:497" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_authorization_mode"
                 time="2026-05-08T18:18:07.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.5.19</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:978" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_authorization_mode_node"
                 time="2026-05-08T18:18:18.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.8.2</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:621" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_authorization_mode_rbac"
                 time="2026-05-08T18:18:32.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.9.13</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:800" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_always_admit"
                 time="2026-05-08T18:18:41.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.3.15</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:429" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_always_pull_images"
                 time="2026-05-08T18:18:53.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.1.8</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:349" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_security_context_deny"
                 time="2026-05-08T18:19:04.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.7.15</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:813" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_service_account"
                 time="2026-05-08T18:19:12.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.1.13</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:325" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_namespace_lifecycle"
                 time="2026-05-08T18:19:19.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.6.11</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:369" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_pod_security_policy"
                 time="2026-05-08T18:19:34.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.6.18</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:742" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_node_restriction"
                 time="2026-05-08T18:19:48.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.5.18</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:446" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_insecure_port"
                 time="2026-05-08T18:19:57.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.4.11</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:412" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_secure_port"
                 time="2026-05-08T18:20:07.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.3.19</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:350" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_profiling"
                 time="2026-05-08T18:20:19.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.8.4</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:627" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_audit_log_path"
                 time="2026-05-08T18:20:34.232025"
                 severity="high"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.7.19</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:496" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: control_plane_api_server_audit_log_path</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_audit_log_maxage"
                 time="2026-05-08T18:20:40.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.9.5</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:204" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_audit_log_maxbackup"
                 time="2026-05-08T18:20:50.232025"
                 severity="medium"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.6.18</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:601" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: control_plane_api_server_audit_log_maxbackup</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_audit_log_maxsize"
                 time="2026-05-08T18:21:04.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.2.16</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:134" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_request_timeout"
                 time="2026-05-08T18:21:11.232025"
                 severity="high"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.8.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:216" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: control_plane_api_server_request_timeout</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_service_account_lookup"
                 time="2026-05-08T18:21:23.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.7.5</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:760" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_service_account_key_file"
                 time="2026-05-08T18:21:33.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.2.15</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:788" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_etcd_certfile"
                 time="2026-05-08T18:21:46.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.4.18</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:552" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_tls_cert_file"
                 time="2026-05-08T18:21:55.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.5.3</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:120" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_client_ca_file"
                 time="2026-05-08T18:22:08.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.8.6</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:634" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_etcd_cafile"
                 time="2026-05-08T18:22:13.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.7.1</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:277" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_encryption_provider_config"
                 time="2026-05-08T18:22:23.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.3.17</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:987" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_tls_cipher_suites"
                 time="2026-05-08T18:22:32.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.8.5</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:960" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_scheduler_profiling"
                 time="2026-05-08T18:22:41.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.5.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:305" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_scheduler_bind_address"
                 time="2026-05-08T18:22:51.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.2.2</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:110" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_terminated_pod_gc_threshold"
                 time="2026-05-08T18:23:00.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.2.2</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:405" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_profiling"
                 time="2026-05-08T18:23:07.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.1.13</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:866" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_use_service_account_credentials"
                 time="2026-05-08T18:23:22.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.1.18</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:301" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_service_account_private_key_file"
                 time="2026-05-08T18:23:37.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.3.6</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:197" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_root_ca_file"
                 time="2026-05-08T18:23:46.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.7.15</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:365" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_feature_gates_rotate_kubelet_server_certificate"
                 time="2026-05-08T18:23:52.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.1.9</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:876" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_bind_address"
                 time="2026-05-08T18:24:02.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.9.17</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:322" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_anonymous_auth"
                 time="2026-05-08T18:24:07.232025"
                 severity="high"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.1.2</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:642" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: worker_node_kubelet_anonymous_auth</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_authorization_mode"
                 time="2026-05-08T18:24:13.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.3.19</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:216" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_client_ca_file"
                 time="2026-05-08T18:24:25.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.4.8</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:172" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_read_only_port"
                 time="2026-05-08T18:24:38.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.6.9</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:280" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_streaming_connection_idle_timeout"
                 time="2026-05-08T18:24:53.232025"
                 severity="high"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.9.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:222" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: worker_node_kubelet_streaming_connection_idle_timeout</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_protect_kernel_defaults"
                 time="2026-05-08T18:25:02.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.6.13</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:724" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_make_iptables_util_chains"
                 time="2026-05-08T18:25:12.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.5.20</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:355" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_hostname_override"
                 time="2026-05-08T18:25:17.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.8.13</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:785" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_event_qps"
                 time="2026-05-08T18:25:30.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.4.15</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:515" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_tls_cert_file"
                 time="2026-05-08T18:25:38.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.2.5</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:295" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_rotate_certificates"
                 time="2026-05-08T18:25:53.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.1.17</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:128" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_cert_file"
                 time="2026-05-08T18:26:08.232025"
                 severity="high"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.9.10</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:664" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: etcd_cert_file</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_client_cert_auth"
                 time="2026-05-08T18:26:17.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.4.11</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:747" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_auto_tls"
                 time="2026-05-08T18:26:30.232025"
                 severity="medium"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.2.20</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:985" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: etcd_auto_tls</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_peer_cert_file"
                 time="2026-05-08T18:26:35.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.9.9</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:851" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_peer_client_cert_auth"
                 time="2026-05-08T18:26:49.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.5.15</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:885" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_peer_auto_tls"
                 time="2026-05-08T18:27:01.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.7.6</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:928" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_unique_ca"
                 time="2026-05-08T18:27:13.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.9.13</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:767" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_network_policy_enabled"
                 time="2026-05-08T18:27:19.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.8.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:654" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_pod_security_policy_enabled"
                 time="2026-05-08T18:27:30.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.4.9</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:396" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
  </TestResult>
</Benchmark>
