<?xml version="1.0" encoding="UTF-8"?>
<Benchmark xmlns="http://checklists.nist.gov/xccdf/1.2"
           xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
           id="xccdf_org.cisecurity.benchmarks_benchmark_kubernetes"
           resolved="true">
  
  <status date="2026-05-07">accepted</status>
  <title>CIS Kubernetes Benchmark v1.8.0</title>
  <description>
    This benchmark provides prescriptive guidance for establishing a secure configuration
    posture for Kubernetes v1.28.0. This guide was tested against Kubernetes
    running on Linux.
  </description>
  <version>1.8.0</version>
  
  <Profile id="xccdf_org.cisecurity.benchmarks_profile_Level_2_-_Worker_Node">
    <title>CIS Kubernetes Benchmark Level 2 - Worker Node</title>
    <description>
      This profile contains configuration checks that align to the CIS Kubernetes Benchmark
      Level 2 for worker nodes.
    </description>
  </Profile>
  
  <TestResult id="xccdf_org.kube-bench_testresult_xccdf_org.cisecurity.benchmarks_profile_Level_2_-_Worker_Node"
              start-time="2026-05-07T11:16:56.232025"
              end-time="2026-05-07T11:24:56.232025"
              version="1.2"
              test-system="cpe:/a:aquasecurity:kube-bench:0.7.0">
    
    <benchmark href="/etc/kube-bench/cfg/cis-1.8/benchmark.yml"
               id="xccdf_org.cisecurity.benchmarks_benchmark_kubernetes"/>
    
    <title>kube-bench Scan Result - Kubernetes worker node running K8s 1.28</title>
    
    <identity authenticated="true" privileged="true">root</identity>
    
    <profile idref="xccdf_org.cisecurity.benchmarks_profile_Level_2_-_Worker_Node"/>
    
    <target>k8s-worker-03.example.com</target>
    <target-address>192.168.2.104</target-address>
    <target-facts>
      <fact name="urn:xccdf:fact:asset:identifier:host_name" type="string">k8s-worker-03.example.com</fact>
      <fact name="urn:xccdf:fact:asset:identifier:ipv4" type="string">192.168.2.104</fact>
      <fact name="urn:xccdf:fact:asset:identifier:platform" type="string">Kubernetes</fact>
      <fact name="urn:xccdf:fact:asset:identifier:k8s_version" type="string">1.28.0</fact>
      <fact name="urn:xccdf:fact:asset:identifier:node_type" type="string">worker</fact>
    </target-facts>
    
    <platform idref="cpe:/a:kubernetes:kubernetes:1.28.0"/>
    
    <score system="urn:xccdf:scoring:default" maximum="100.000000">90.0</score>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_anonymous_auth"
                 time="2026-05-07T11:17:01.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.5.11</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:645" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_basic_auth"
                 time="2026-05-07T11:17:12.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.5.8</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:852" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_token_auth"
                 time="2026-05-07T11:17:27.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.8.6</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:745" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_kubelet_https"
                 time="2026-05-07T11:17:35.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.8.13</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:286" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_kubelet_client_certificate"
                 time="2026-05-07T11:17:47.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.1.18</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:374" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_kubelet_certificate_authority"
                 time="2026-05-07T11:17:55.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.2.13</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:298" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_authorization_mode"
                 time="2026-05-07T11:18:00.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.9.2</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:587" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_authorization_mode_node"
                 time="2026-05-07T11:18:09.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.9.17</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:514" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_authorization_mode_rbac"
                 time="2026-05-07T11:18:20.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.4.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:813" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_always_admit"
                 time="2026-05-07T11:18:34.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.5.17</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:838" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_always_pull_images"
                 time="2026-05-07T11:18:49.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.3.16</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:785" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_security_context_deny"
                 time="2026-05-07T11:18:57.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.6.5</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:929" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_service_account"
                 time="2026-05-07T11:19:03.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.6.9</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:949" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_namespace_lifecycle"
                 time="2026-05-07T11:19:14.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.9.4</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:153" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_pod_security_policy"
                 time="2026-05-07T11:19:25.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.9.9</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:955" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_admission_control_plugin_node_restriction"
                 time="2026-05-07T11:19:34.232025"
                 severity="high"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.6.20</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:813" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: control_plane_api_server_admission_control_plugin_node_restriction</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_insecure_port"
                 time="2026-05-07T11:19:46.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.3.2</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:842" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_secure_port"
                 time="2026-05-07T11:19:59.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.7.9</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:939" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_profiling"
                 time="2026-05-07T11:20:14.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.4.8</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:548" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_audit_log_path"
                 time="2026-05-07T11:20:25.232025"
                 severity="medium"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.4.4</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:329" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: control_plane_api_server_audit_log_path</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_audit_log_maxage"
                 time="2026-05-07T11:20:33.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.5.16</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:914" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_audit_log_maxbackup"
                 time="2026-05-07T11:20:46.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.2.10</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:769" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_audit_log_maxsize"
                 time="2026-05-07T11:20:58.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.1.14</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:798" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_request_timeout"
                 time="2026-05-07T11:21:10.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.5.2</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:671" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_service_account_lookup"
                 time="2026-05-07T11:21:16.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.9.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:271" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_service_account_key_file"
                 time="2026-05-07T11:21:29.232025"
                 severity="low"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.8.2</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:668" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: control_plane_api_server_service_account_key_file</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_etcd_certfile"
                 time="2026-05-07T11:21:44.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.1.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:765" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_tls_cert_file"
                 time="2026-05-07T11:21:53.232025"
                 severity="low"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.6.2</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:589" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: control_plane_api_server_tls_cert_file</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_client_ca_file"
                 time="2026-05-07T11:22:04.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.2.15</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:307" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_etcd_cafile"
                 time="2026-05-07T11:22:17.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.3.11</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:991" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_encryption_provider_config"
                 time="2026-05-07T11:22:31.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.3.4</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:378" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_api_server_tls_cipher_suites"
                 time="2026-05-07T11:22:44.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.3.1</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:862" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_scheduler_profiling"
                 time="2026-05-07T11:22:59.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.4.17</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:775" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_scheduler_bind_address"
                 time="2026-05-07T11:23:11.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.2.1</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:818" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_terminated_pod_gc_threshold"
                 time="2026-05-07T11:23:16.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.8.1</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:786" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_profiling"
                 time="2026-05-07T11:23:25.232025"
                 severity="high"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.2.20</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:156" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: control_plane_controller_manager_profiling</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_use_service_account_credentials"
                 time="2026-05-07T11:23:30.232025"
                 severity="low"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.7.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:925" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: control_plane_controller_manager_use_service_account_credentials</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_service_account_private_key_file"
                 time="2026-05-07T11:23:45.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.6.17</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:775" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_root_ca_file"
                 time="2026-05-07T11:23:56.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.5.14</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:367" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_feature_gates_rotate_kubelet_server_certificate"
                 time="2026-05-07T11:24:07.232025"
                 severity="low"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.5.2</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:851" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: control_plane_controller_manager_feature_gates_rotate_kubelet_server_certificate</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_control_plane_controller_manager_bind_address"
                 time="2026-05-07T11:24:22.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.9.15</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:793" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_anonymous_auth"
                 time="2026-05-07T11:24:32.232025"
                 severity="medium"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.2.4</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:398" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: worker_node_kubelet_anonymous_auth</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_authorization_mode"
                 time="2026-05-07T11:24:38.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.7.11</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:603" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_client_ca_file"
                 time="2026-05-07T11:24:50.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.5.13</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:494" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_read_only_port"
                 time="2026-05-07T11:24:56.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.2.11</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:895" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_streaming_connection_idle_timeout"
                 time="2026-05-07T11:25:02.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.6.10</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:390" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_protect_kernel_defaults"
                 time="2026-05-07T11:25:07.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.8.9</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:399" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_make_iptables_util_chains"
                 time="2026-05-07T11:25:16.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.8.8</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:130" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_hostname_override"
                 time="2026-05-07T11:25:24.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.3.12</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:933" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_event_qps"
                 time="2026-05-07T11:25:34.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.2.11</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:360" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_tls_cert_file"
                 time="2026-05-07T11:25:42.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.3.5</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:448" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_worker_node_kubelet_rotate_certificates"
                 time="2026-05-07T11:25:50.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.8.17</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:779" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_cert_file"
                 time="2026-05-07T11:26:04.232025"
                 severity="medium"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-3.7.5</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:341" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_client_cert_auth"
                 time="2026-05-07T11:26:11.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.3.7</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:910" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_auto_tls"
                 time="2026-05-07T11:26:24.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.9.17</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:734" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_peer_cert_file"
                 time="2026-05-07T11:26:34.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.1.17</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:384" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_peer_client_cert_auth"
                 time="2026-05-07T11:26:39.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.6.16</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:840" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_peer_auto_tls"
                 time="2026-05-07T11:26:53.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-5.9.1</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:662" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_etcd_unique_ca"
                 time="2026-05-07T11:27:00.232025"
                 severity="high"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-2.6.18</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:295" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_network_policy_enabled"
                 time="2026-05-07T11:27:15.232025"
                 severity="medium"
                 weight="1.000000">
      <result>fail</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-1.1.12</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:898" href="cis-kubernetes-oval.xml"/>
      </check>
      <message severity="error">Check failed: network_policy_enabled</message>
    </rule-result>
    
    <rule-result idref="xccdf_org.cisecurity.benchmarks_rule_pod_security_policy_enabled"
                 time="2026-05-07T11:27:24.232025"
                 severity="low"
                 weight="1.000000">
      <result>pass</result>
      <ident system="https://www.cisecurity.org/benchmark/kubernetes">CIS-K8S-4.4.13</ident>
      <check system="http://oval.mitre.org/XMLSchema/oval-definitions-5">
        <check-content-ref name="oval:org.cisecurity.benchmarks:def:722" href="cis-kubernetes-oval.xml"/>
      </check>
    </rule-result>
    
  </TestResult>
</Benchmark>
