The Kubernetes component PKI must be owned by root. (Cat II impact)
The Kubernetes PKI directory contains all certificates (.crt files) supporting secure network communications in the Kubernetes Control Plane. If these files can be modified, data traversing within the architecture components would become unsecure and compromised. Many of the security settings within the document are implemented through this file.
Review the PKI files in Kubernetes by using the command: ls -laR /etc/kubernetes/pki/ If the command returns any non root:root file permissions, this is a finding.
Change the ownership of the PKI to root: root by executing the command: chown -R root:root /etc/kubernetes/pki/
The organization implements the security configuration settings.