The Kubernetes Kube Proxy must have file permissions set to 644 or more restrictive. (Cat II impact)
The Kubernetes kube proxy kubeconfig contain the argument and setting for the Control Planes. These settings contain network rules for restricting network communication between pods, clusters, and networks. If these files can be changed, data traversing between the Kubernetes Control Panel components would be compromised. Many of the security settings within the document are implemented through this file.
Check if Kube-Proxy is running and obtain --kubeconfig parameter use the following command: ps -ef | grep kube-proxy If Kube-Proxy exists: Review the permissions of the Kubernetes Kube Proxy by using the command: stat -c %a <location from --kubeconfig> If the file has permissions more permissive than "644", this is a finding.
Change the permissions of the Kube Proxy to "644" by executing the command: chmod 644 <location from kubeconfig>.
Rule ID: SV-242447r864019_rule
Vulnerability ID: V-242447
Group Title: SRG-APP-000516-CTR-001325
The organization implements the security configuration settings.