Encrypt traffic to HTTPS load balancers using Google-managed SSL certificates. Rationale: Encrypting traffic between users and your Kubernetes workload is fundamental to protecting data sent over the web. Google-managed SSL Certificates are provisioned, renewed, and managed for your domain names. This is only available for HTTPS load balancers created using Ingress Resources, and not TCP/UDP load balancers created using Service of type:LoadBalancer. NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
If services of type:LoadBalancer are discovered, consider replacing the Service with an Ingress. To configure the Ingress and use Google-managed SSL certificates, follow the instructions as listed at https://cloud.google.com/kubernetes-engine/docs/how-to/managed-certs. Impact: Google-managed SSL Certificates are less flexible than certificates you obtain and manage yourself. Managed certificates support a single, non-wildcard domain. Self-managed certificates can support wildcards and multiple subject alternative names (SANs). Default Value: By default, Google-managed SSL Certificates are not created when an Ingress resource is defined.