Check: CNTR-K8-003160
Kubernetes STIG:
CNTR-K8-003160
(in versions v1 r9 through v1 r7)
Title
The Kubernetes Kubelet certificate authority file must have file permissions set to 644 or more restrictive. (Cat II impact)
Discussion
The Kubernetes kubelet certificate authority file contains settings for the Kubernetes Node TLS certificate authority. Any request presenting a client certificate signed by one of the authorities in the client-ca-file is authenticated with an identity corresponding to the CommonName of the client certificate. If this file can be changed, the Kubernetes architecture could be compromised. The scheduler will implement the changes immediately. Many of the security settings within the document are implemented through this file.
Check Content
Change to the /etc/sysconfig/ directory on the Kubernetes Control Plane. Run command: more kubelet --client-ca-file argument Note certificate location If the ca-file argument location file has permissions more permissive than "644", this is a finding.
Fix Text
Change the permissions of the --client-ca-file to "644" by executing the command: chmod 644 <kubelet --client--ca-file argument location>.
Additional Identifiers
Rule ID: SV-242449r879887_rule
Vulnerability ID: V-242449
Group Title: SRG-APP-000516-CTR-001325
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |