laid out in the CIS GKE Benchmark. security controls. Benchmark are your responsibility, and there are recommendations that you CIS Kubernetes Benchmark is written for the open source Kubernetes CIS-CAT Lite helps users implement secure configurations for multiple technologies. Since many configurations in the control plane cannot be audited or that need permanent storage should be sent to logs. See, GKE rotates server certificates for Run on the cleanest cloud in the industry. There are open source and commercial tools that can automatically check your Docker environment against the recommendations defined in the CIS Benchmark for Docker to identify insecure configurations. Teaching tools to provide more engaging learning experiences. An objective, consensus-driven security guideline for the Kubernetes Server Software. Content delivery network for delivering web and video. Virtual network for Google Cloud resources and cloud-based services. encrypts customer content at rest by default. GKE uses TLS for API server to kubelet traffic, which Workflow orchestration for serverless products and API services. Make smarter decisions with the leading data platform. specified in the kubelet config file. Organizations can use the CIS Benchmark for Docker to validate that their Docker containers and the Docker runtime are configured as securely as possible. Connectivity options for VPN, peering, and enterprise needs. Data warehouse to jumpstart your migration and unlock insights. AI model for speaking with customers and assisting human agents. Change the way teams work with solutions designed for humans and built for impact. In some cases, for example multi-tenant workloads, these As part of the CIS community, NNT has access to consensus security configuration benchmarks, software, metrics, and discussion forums where NNT is an integral stakeholder in collaborating on security best practices. checks to simplify the verification of these controls in your environment. Download PDF. Interactive shell environment with a built-in command line. CIS Kubernetes Benchmark — The Center for Internet Security (CIS) Kubernetes Benchmark is a reference document that can be used by system administrators, security and audit professionals and other IT roles to establish a secure configuration baseline for Kubernetes. kubelet, the exposure is identical to the read-only port as private registry images in noncooperative multitenant clusters, at the Failure to comply with these recommendations will decrease the final Reimagine your operations and unlock new opportunities. Analytics and collaboration tools for the retail value chain. Domain name system for reliable and low-latency name lookups. Service catalog for admins managing internal enterprise solutions. 1.4.20 Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more restrictive (Scored)..... 147 1.4.21 Ensure that the Kubernetes PKI key file permissions are set to 600 (Scored) Cron job scheduler for task automation and management. X. Reduce cost, increase operational agility, and capture new market opportunities. No Pod Security Policy is set by default. CIS Kubernetes Benchmark v1.3.0. This article covers the security hardening applied to AKS virtual machine hosts. Benchmarks are, how to audit your compliance with the Benchmarks, and what Database services to migrate, manage, and modernize data. Does not comply with a Benchmark recommendation. products or features. GKE does not enable the Security Context admission Data warehouse for business agility and insights. Unified platform for IT admins to manage user devices and apps. Generate instant insights from data at any scale with a serverless, fully managed analytics platform that significantly simplifies analytics. Pay only for what you use with no lock-in, Pricing details on each Google Cloud product, View short tutorials to help you get started, Deploy ready-to-go solutions in a few clicks, Enroll in on-demand or classroom training, Jump-start your project with help from Google, Work with a Partner in our global network, Creating a cluster using Windows node pools, Manually upgrading a cluster or node pool, Using Compute Engine sole-tenant nodes in GKE, Configuring maintenance windows and exclusions, Reducing add-on resource usage in smaller clusters, Deploying an application from GCP Marketplace, Configuring multidimensional Pod autoscaling, Managing applications with Application Delivery, Using the Compute Engine persistent disk CSI Driver, Using persistent disks with multiple readers, Using preexisting persistent disks as PersistentVolumes, Configuring Ingress for external load balancing, Configuring Ingress for internal load balancing, Container-native load balancing through Ingress, Container-native load balancing through standalone NEGs, Authenticating to the Kubernetes API server, Encrypting secrets at the application layer, Harden workload isolation with GKE Sandbox, Custom and external metrics for autoscaling workloads, Ingress for External HTTP(S) Load Balancing, Ingress for Internal HTTP(S) Load Balancing, Persistent volumes and dynamic provisioning, Overview of Google Cloud's operations suite for GKE, Deploying a containerized web application, Deploying WordPress on GKE with persistent disks and Cloud SQL, Authenticating to Google Cloud Platform with service accounts, Upgrading a GKE cluster running a stateful workload, Setting up HTTP load balancing with Ingress, Configuring domain names with static IP addresses, Configuring network policies for applications, Creating private clusters with network proxies for controller access, GitOps-style continuous delivery with Cloud Build, Continuous delivery pipelines with Spinnaker, Automating canary analysis with Spinnaker, Customizing Cloud Logging logs with Fluentd, Processing logs at scale using Cloud Dataflow, Migrating workloads to different machine types, Autoscaling deployments with Cloud Monitoring metrics, Building Windows Server multi-arch images, Optimizing resource usage with node auto-provisioning, Configuring cluster upgrade notifications for third-party services, Transform your business with innovative solutions. You can generally audit and remediate any products or features. Web-based interface for managing and monitoring cloud apps. Some GKE monitoring components use the kubelet Zero-trust access control for your internal web apps. GKE does not controller as it is a Kubernetes Alpha feature. Java is a registered trademark of Oracle and/or its affiliates. Automatic cloud resource optimization and increased security. GKE, Kubernetes, Docker, and Linux. Data transfers from online and on-premises sources to Cloud Storage. is authenticated for GKE v1.12+ clusters. applicable to all cases. Rapid Assessment & Migration Program (RAMP). Whether your business is early in its journey or well on its way to digital transformation, Google Cloud's solutions and technologies help solve your toughest challenges. Kube Bench is an open-source Go application that runs the CIS Kubernetes Benchmark tests on your cluster to ensure that it meets the CIS guidelines for security. CIS Kubernetes Benchmark v1.5 - Rancher v2.4 with Kubernetes v1.15 Click here to download a PDF version of this document Overview This document is a companion to the Rancher v2.4 security hardening guide. A new cluster does not comply with a Benchmark recommendation by default. Speech synthesis in 220+ voices and 40+ languages. Kubernetes-native resources for declaring CI/CD pipelines. Service for executing builds on Google Cloud infrastructure. manages the following Kubernetes components: Configurations related to these For GKE-specific recommendations (section 6), since these are Prioritize investments and optimize costs. GKE disables the additional debugging handlers. Recommendations result in a more stringent security environment, but Download PDF. Migrate and manage enterprise data with security, reliability, high availability, and fully managed data services. in confusing and potentially contradictory advice because those benchmarks are running on GKE, not to GKE system The CIS Kubernetes Benchmark is written for the open source Kubernetes distribution and intended to be as universally applicable across distributions as possible. Cloud provider visibility through near real-time logs. Some of Serverless application platform for apps and back ends. security recommendations. In this case, Enterprise search for employees to quickly find company information. GKE does not enable Store API keys, passwords, certificates, and other sensitive data. Tools for automating and maintaining system configurations. The Center for Internet Security (CIS) maintains a Kubernetes benchmark that is helpful to ensure clusters are deployed in accordance with security best practices. for recommendations in sections 1-5 are different in the CIS With a managed service like GKE, not all items on the In collaboration with CIS, IBM has already been awarded CIS Security Software Certification Benchmarks on a variety of IBM products. The Center for Internet Security (CIS) maintains a Kubernetes benchmark which helps ensure clusters are deployed in accordance with security best practices. When NAT service for giving private instances internet access. The following table evaluates Since CIS Kubernetes Benchmark provides good practice guidance on security configurations for Kubernetes clusters, customers asked us for guidance on CIS Kubernetes Benchmark for Amazon EKS to meet their security and compliance requirements. Products to build and use artificial intelligence. GKE Hybrid and multi-cloud services to deploy and monetize 5G. See. evaluated for your environment before being applied. Charmed Kubernetes supports the kube-bench utility to report how well a cluster complies with a benchmark. Reinforced virtual machines on Google Cloud. IDE support to write, run, and debug Kubernetes applications. default values used in GKE, with an explanation. Service for running Apache Spark and Apache Hadoop clusters. environment complies with a Benchmark recommendation. Download PDF. Benchmark are in section 6, some of the audit and remediation procedures Benchmark. to be applied to the GKE distribution. distribution and intended to be as universally applicable across distributions exposes the cluster to unnecessary DoS risk and contradicts the Custom and pre-trained models to detect emotion, text, more. Migration and AI tools to optimize the manufacturing value chain. Relational database services for MySQL, PostgreSQL, and SQL server. Cloud-native relational database with unlimited scale and 99.999% availability. The hardening guide provides prescriptive guidance for hardening a production installation of Rancher, and this benchmark Infrastructure and application health with rich metrics. the final benchmark score. Security relevant events here's how it will perform against the CIS Kubernetes Benchmark. Solution for bridging existing care systems and apps on Google Cloud. IBM continues to develop additional benchmarks for IAM, logging and monitoring, networking and storage, Database-as-a-Service (DBaaS) , and Kubernetes. This document explains what the CIS Kubernetes and Google Kubernetes Engine (GKE) Compute instances for batch jobs and fault-tolerant workloads. Upgrades to modernize your operational database infrastructure. Does not comply with the exact terms in the Benchmark recommendation, Security is a critical consideration for configuring and maintaining Kubernetes clusters and applications. Components to create Kubernetes-native cloud-based software. Benchmark, but remove items that are not configurable or managed by the user, GKE workloads, since you do not have access to the control plane For more information about AKS security, see Security concepts for applications and clusters in Azure Kubernetes … Download CIS-CAT® Lite Today. understand how your Rehost, replatform, rewrite your Oracle workloads. Although the only additional recommendations in the CIS GKE does not but other mechanisms in GKE exist to provide equivalent benchmark score. additional controls that are Google Cloud-specific. evaluation to determine the exact implementation appropriate for your Checksum. CIS Kubernetes Benchmark v1.2.0. Processes and resources for implementing DevOps in your org. Migrate and run your VMware workloads natively on Google Cloud. admins to implement admission policy to make this tradeoff for themselves. CIS Kubernetes Benchmark v1.1.0. Recommendations are easily tested using an automated method, and has a See. Discovery and analysis tools for moving to the cloud. and add additional controls that are Google Cloud-specific. This set of scripts can be used to check the Kubernetes installation against the best-practices. GKE does not support the Event Rate Limit admission Serverless, minimal downtime migrations to Cloud SQL. Download PDF. Components for migrating VMs into system containers on GKE. CIS has worked with the community since 2017 to publish a benchmark for Kubernetes Join the Kubernetes community Other CIS Benchmark versions: For Kubernetes (CIS Kubernetes Benchmark version 1.6.0) Complete CIS Benchmark Archive Streaming analytics for stream and batch processing. Automate repeatable tasks for one machine or millions. The CIS Benchmarks are distributed free of charge in PDF format to propagate their worldwide use and adoption as user-originated, de facto standards. Migration solutions for VMs, apps, databases, and more. able to be applied in concert with other recommendations. posture. CIS Kubernetes Benchmark - InSpec Profile Description. as customer workloads may want to modify these. Start building right away on our secure, intelligent platform. FHIR API-based digital service production. Additional Info. these recommendations can be remediated, following the remediation procedures Block storage for virtual machine instances running on Google Cloud. that the container runtime containerd FHIR API-based digital service formation. API management, development, and security platform. This often results GKE does not configure items related to this To switch between the … Description In today’s regulatory environment, organizations must stay on top of compliance requirements while modernizing to cloud-native Kubernetes, mitigates against security breaches through continuous automation. Open banking and PSD2-compliant API delivery. The CIS Kubernetes Benchmark is a set of recommendations for configuring Kubernetes to support a strong security posture. Analytics, you'll be notified of cluster misconfigurations you may have as possible. automatically audited are marked as Scored in the CIS GKE default node OS for GKE, does not have a CIS Benchmark; and Chrome OS, Chrome Browser, and Chrome devices built for business. Automate CIS Benchmark Assessment using DevSecOps pipelines James Gress January 9, 2021 2 min read Were kicking off 2021 with a lot of great content and what better topic to start the year off that is aligned to Security. GKE configures where you cannot directly audit or implement cost of making container registries a single-point-of-failure for creating Prescriptive guidance for establishing a secure configuration posture for Cisco devices running Cisco NX-OS. Example of one test from the CIS Kubernetes Benchmark. CIS Kubernetes Benchmark v1.6.1 L1 Master (Audit last updated January 04, 2021) 198 kB. With unlimited scans available via CIS-CAT Lite, your organization can download and start implementing CIS Benchmarks in minutes. a new GKE cluster against the CIS Kubernetes Benchmark, An objective, consensus-driven security guideline for the Kubernetes Server Software. See, GKE rotates server certificates for Block storage that is locally attached for high-performance needs. Red Hat to bolster the Kubernetes security capabilities of its OpenShift platform with StackRox acquisition. Programmatic interfaces for Google Cloud services. Hardened service running Microsoft® Active Directory (AD). environment is already configured by GKE. to test your cluster configuration against the CIS Kubernetes Benchmark. Azure Kubernetes Service (AKS) is a secure service compliant with SOC, ISO, PCI DSS, and HIPAA standards. existing CIS Benchmark, but GKE, use the CIS GKE Benchmark, Supported CIS Kubernetes versions Solutions for collecting, analyzing, and activating customer data. Fully managed database for MySQL, PostgreSQL, and SQL Server. Unless specified, the values for workloads pertain to the environment you Sensitive data inspection, classification, and redaction platform. With GKE, you can use CIS Benchmarks for: Encrypt data in use with Confidential VMs. Containerized apps with prebuilt deployment and unified billing. Some tools attempt to analyze Kubernetes nodes against multiple CIS Benchmarks The CIS document provides prescriptive guidance for establishing a secure configuration posture for Kubernetes. process for certificate rotation. Collaboration and productivity tools for enterprises. Universal package manager for build artifacts and dependencies. Tools and services for transferring your data to Google Cloud. AI with job search and talent acquisition capabilities. this flag. all configurable such that they can be configured to Pass in your environment, Self-service and custom developer portal creation. Note that this does not allow you to audit recommendations from the Kubernetes Platform for defending against threats to your Google Cloud assets. Oracle MySQL Database Server. Marketing platform unifying advertising and analytics. Insights from ingesting, processing, and analyzing event streams. Containers with data science frameworks, libraries, and tools. Remote work solutions for desktops and applications (VDI & DaaS). GKE does not configure items related to this Fully managed, native VMware Cloud Foundation software stack. Services and infrastructure for building web apps and websites. Recommendations exhibit one or more of the following characteristics: We use the following values to specify the status of Kubernetes recommendations Tools for monitoring, controlling, and optimizing your costs. No-code development platform to build and extend applications. Messaging service for event ingestion and delivery. Shielded GKE Nodes are enabled. Monitoring, logging, and application performance suite. Dedicated hardware for compliance, licensing, and management. NoSQL database for storing and syncing data in real time. This profile implements the CIS Kubernetes 1.5.0 Benchmark.. etcd. Recommendation. Network monitoring, verification, and optimization platform. CIS-CAT Lite is the free assessment tool developed by the CIS (Center for Internet Security, Inc.). not inhibit the utility of the technology beyond acceptable means. CIS Cisco NX-OS Benchmark v1.0.0. cluster created in GKE performs against the CIS Kubernetes Workflow orchestration service built on Apache Airflow. Hybrid and Multi-cloud Application Platform. Container environment security for each stage of the life cycle. The CIS Kubernetes Benchmark is a set Beta The scoring for the CIS Kubernetes Benchmark and the CIS Note that the version numbers for different Benchmarks may not be the same. For components Data integration for building and managing data pipelines. Detect, investigate, and respond to online threats to help protect your business. Services for building and modernizing your data lake. MIT Kerberos Authentication Server. set. App migration to the cloud for low-cost refresh cycles. End-to-end solution for building, deploying, and managing apps. This draws from the GKE does not enable the Image Policy Webhook Cloud-native document database for building rich mobile, web, and IoT apps. Data import service for scheduling and moving data into BigQuery. Tracing system collecting latency data from applications. GKE uses mTLS for peer traffic between instances of value that can be definitively evaluated. Health-specific solutions to enhance the patient experience. View Our Extensive Benchmark List: The sections of the CIS GKE Benchmark are: For the items that cannot be audited or remediated on GKE, The Kubernetes CIS Benchmark tests have been implemented in NeuVector to simplify auditing and compliance testing of Kubernetes clusters. are intended for environments or use cases where security is paramount; may negatively inhibit the utility or performance of the technology. controller by default. The CIS Kubernetes community has been busy working on refreshing the benchmark to align with the new released features and narrow the gap between the announcement of the GA version of the product and the benchmark … removes items that are not configurable or managed by the user and adds Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. The control plane (master), including the control plane VMs, API server, other Attract and empower an ecosystem of developers and partners. Google Cloud audit, platform, and application logs management. These recommendations may use Accelerate business recovery and ensure a better future with solutions that enable hybrid and multi-cloud, generate intelligent insights, and keep your workers connected. GPUs for ML, scientific computing, and 3D visualization. between the API server to etcd. GKE captures audit logs, but does not use these flags Platform for BI, data applications, and embedded analytics. Benchmark to perform an audit. and is preferred. Linux, Docker, and Kubernetes) and combine the results. These should be GKE v1.12+ clusters. the workloads themselves. The Center for Internet Security provides a number of guidelines and benchmark tests for best practices in securing your code. Home • Resources • Platforms • Kubernetes. Announcing the Center for Internet Security (CIS) Oracle Cloud Infrastructure (OCI) Container Engine for Kubernetes (OKE) Benchmark GKE customers can enable PodSecurityPolicy. Cloud-native wide-column database for large scale, low-latency workloads. This includes Charmed Kubernetes includes support for the kube-bench utility, which reports how well a cluster complies with this benchmark. Resources and solutions for cloud-native organizations. containers. Managed Service for Microsoft Active Directory. IoT device management, integration, and connection service. Benchmark from the CIS Kubernetes Benchmark. Package manager for build artifacts and dependencies. Sentiment analysis and classification of unstructured text. The AlwaysPullImages admission controller provides some protection for Cloud services for extending and modernizing legacy apps. CIS Benchmarks are the only consensus-based, best-practice security configuration guides both developed and accepted by government, business, industry, and academia. By enabling Security Health How Google is helping healthcare meet extraordinary challenges. Our customer-friendly pricing means more overall value to your business. GKE Benchmark. See. Tools for managing, processing, and transforming biomedical data. Add intelligence and efficiency to your business with AI and machine learning. GKE security recommendations. Server and virtual machine migration to Compute Engine. Ensure that the API server pod specification file permissions are set to, Ensure that the API server pod specification file ownership is set to, Ensure that the controller manager pod specification file permissions are set to, Ensure that the controller manager pod specification file ownership is set to, Ensure that the scheduler pod specification file permissions are set to, Ensure that the scheduler pod specification file ownership is set to, Ensure that the etcd pod specification file permissions are set to, Ensure that the etcd pod specification file ownership is set to, Ensure that the Container Network Interface file permissions are set to, Ensure that the Container Network Interface file ownership is set to, Ensure that the etcd data directory permissions are set to, Ensure that the etcd data directory ownership is set to, Ensure that the admin.conf file permissions are set to, Ensure that the admin.conf file ownership is set to, Ensure that the scheduler.conf file permissions are set to, Ensure that the scheduler.conf file ownership is set to, Ensure that the controller-manager.conf file permissions are set to, Ensure that the controller-manager.conf file ownership is set to, Ensure that the Kubernetes PKI directory and file ownership is set to, Ensure that the Kubernetes PKI certificate file permissions are set to, Ensure that the Kubernetes PKI key file permissions are set to, Ensure that the --anonymous-auth argument is set to false, Ensure that the --basic-auth-file argument is not set, Ensure that the --token-auth-file parameter is not set, Ensure that the --kubelet-https argument is set to true, Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate, Ensure that the --kubelet-certificate-authority argument is set as appropriate, Ensure that the --authorization-mode argument is not set to AlwaysAllow, Ensure that the --authorization-mode argument includes Node, Ensure that the --authorization-mode argument includes RBAC, Ensure that the admission control plugin EventRateLimit is set, Ensure that the admission control plugin AlwaysAdmit is not set, Ensure that the admission control plugin AlwaysPullImages is set, Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used, Ensure that the admission control plugin ServiceAccount is set, Ensure that the admission control plugin NamespaceLifecycle is set, Ensure that the admission control plugin PodSecurityPolicy is set, Ensure that the admission control plugin NodeRestriction is set, Ensure that the --insecure-bind-address argument is not set, Ensure that the --insecure-port argument is set to 0, Ensure that the --secure-port argument is not set to 0, Ensure that the --profiling argument is set to false, Ensure that the --audit-log-path argument is set, Ensure that the --audit-log-maxage argument is set to 30 or as appropriate, Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate, Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate, Ensure that the --request-timeout argument is set as appropriate, Ensure that the --service-account-lookup argument is set to true, Ensure that the --service-account-key-file argument is set as appropriate, Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate, Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate, Ensure that the --client-ca-file argument is set as appropriate, Ensure that the --etcd-cafile argument is set as appropriate, Ensure that the --encryption-provider-config argument is set as appropriate, Ensure that encryption providers are appropriately configured, Ensure that the API Server only makes use of Strong Cryptographic Ciphers, Ensure that the --terminated-pod-gc-threshold argument is set as appropriate, Ensure that the --use-service-account-credentials argument is set to true, Ensure that the --service-account-private-key-file argument is set as appropriate, Ensure that the --root-ca-file argument is set as appropriate, Ensure that the RotateKubeletServerCertificate argument is set to true, Ensure that the --bind-address argument is set to 127.0.0.1, Ensure that the --cert-file and --key-file arguments are set as appropriate, Ensure that the --client-cert-auth argument is set to true, Ensure that the --auto-tls argument is not set to true, Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate, Ensure that the --peer-client-cert-auth argument is set to true, Ensure that the --peer-auto-tls argument is not set to true, Ensure that a unique Certificate Authority is used for etcd, Client certificate authentication should not be used for users, Ensure that a minimal audit policy is created, Ensure that the audit policy covers key security concerns, Ensure that the kubelet service file permissions are set to, Ensure that the kubelet service file ownership is set to, Ensure that the proxy kubeconfig file permissions are set to, Ensure that the proxy kubeconfig file ownership is set to, Ensure that the kubelet.conf file permissions are set to, Ensure that the kubelet.conf file ownership is set to, Ensure that the certificate authorities file permissions are set to, Ensure that the client certificate authorities file ownership is set to, Ensure that the kubelet configuration file has permissions set to, Ensure that the kubelet configuration file ownership is set to, Ensure that the --read-only-port argument is set to 0, Ensure that the --streaming-connection-idle-timeout argument is not set to 0, Ensure that the --protect-kernel-defaults argument is set to true, Ensure that the --make-iptables-util-chains argument is set to true, Ensure that the --hostname-override argument is not set, Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture, Ensure that the --rotate-certificates argument is not set to false, Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers, Ensure that the cluster-admin role is only used where required, Minimize wildcard use in Roles and ClusterRoles, Ensure that default service accounts are not actively used, Ensure that Service Account Tokens are only mounted where necessary, Minimize the admission of privileged containers, Minimize the admission of containers wishing to share the host process ID namespace, Minimize the admission of containers wishing to share the host IPC namespace, Minimize the admission of containers wishing to share the host network namespace, Minimize the admission of containers with allowPrivilegeEscalation, Minimize the admission of root containers, Minimize the admission of containers with the NET_RAW capability, Minimize the admission of containers with added capabilities, Minimize the admission of containers with capabilities assigned, Ensure that the CNI in use supports Network Policies, Ensure that all Namespaces have Network Policies defined, Prefer using secrets as files over secrets as environment variables, Configure Image Provenance using ImagePolicyWebhook admission controller, Create administrative boundaries between resources using namespaces, Ensure that the seccomp profile is set to docker/default in your pod definitions, Apply Security Context to Your Pods and Containers.

Tente 2 Secondes Black And Fresh, Technologie 6ème Fonction Technique Et Solution Technique évaluation, Loisirs En Anglais, Pensée Du Jour 2020, La Reine Des Airs Mots Fléchés,