Installation Manual - 85 Hub CIS manual check classification

Read-only classification of the remaining hub-dc-v7 CIS MANUAL compliance checks.

This chapter records the hub-dc-v7 read-only classification gate for the remaining MANUAL CIS compliance checks after the hub reached zero failing checks.

No live cluster state was changed.

Governance

FieldValue
IssueOP-GF-COMPLIANCE-14 / #406
MilestoneWorkspace Governance
Governing ADRADR 0016
PredecessorOP-GF-COMPLIANCE-13 / #405

Access Path

All live checks used the established path:

local workspace -> dl385-2 -> gf-ocp-bootstrap-01 -> hub-dc-v7 kubeconfig

No Secret values, kubeconfigs, tokens, pull secrets, PAT values, MinIO keys, or full Secret manifests were printed.

Current Compliance State

Read-only validation at 2026-05-19T13:04:02Z:

CheckResult
OpenShift4.20.18
ClusterVersionAvailable, not Progressing, not Failing
Nodes3/3 Ready
hub-dc-v7-bootstrapSynced/Healthy at 12c68aee6d6a77dfcc197926d4f36594ea224625
ClusterOperatorssteady
Non-running podsnone
ComplianceScan/ocp4-cisDONE / COMPLIANT
ComplianceScan/ocp4-cis-node-masterDONE / COMPLIANT
Compliance result countsPASS=162, MANUAL=21, FAIL=0

Evidence Snapshot

EvidenceResult
default namespaceonly service/kubernetes and service/openshift
Non-system pod use of default service accountnone
Vault R1 ClusterSecretStoresall Ready=True, reason Valid
ExternalSecrets7/7 Ready
Secret env-var references in non-system podsstackrox/sensor, container crs
Non-system SCC usagerestricted-v2=103, nonroot-v2=9, privileged=3, anyuid=1
Privileged SCC podsstackrox/collector-*
Anyuid SCC podrhacs-operator/rhacs-operator-controller-manager-*

Local cluster-admin subjects include:

  • User::ze
  • ServiceAccount:openshift-gitops:openshift-gitops-argocd-application-controller

Those are in addition to OpenShift system bindings and were not modified in this gate.

Manual Check Classification

GroupChecksDecision
Evidence-ready attestationsunique service accounts, default namespace use, namespace inventory, external secret storageCurrent evidence is ready to include in an audit pack.
Operational/vendor attestationsservice-account token posture, SCC/default seccomp posture, StackRox secret env-var useRecord current state and vendor/platform rationale.
Future RBAC auditleast privilege, cluster-admin, secret access, pod creation, wildcard useNeeds a dedicated RBAC review before any changes.
SCC exception registercapabilities, host IPC, NET_RAW, host network, privilege escalation, privileged containers, host PID, root/anyuid containersBuild an explicit exception register before tightening SCC use.

Decision

The remaining MANUAL checks are not a single remediation backlog. They are an evidence and exception-management queue.

Do not bulk-reduce RBAC or SCC privileges. The next step should create an auditable evidence pack and exception register, then choose any real remediation gates from that evidence.

Next Gate

Recommended next gate:

OP-GF-COMPLIANCE-15: hub CIS manual evidence pack and exception register

The evidence pack should explicitly track:

  • RHACS collector privileged SCC use
  • RHACS operator anyuid SCC use
  • StackRox sensor secret env-var use
  • Argo CD application-controller cluster-admin access
  • local human break-glass cluster-admin access for ze

Last reviewed: 2026-05-19