1.3.4 Ensure that the --service-account-private-key-file argument is set as appropriate

Information

Explicitly set a service account private key file for service accounts on the controller manager.

Rationale:

To ensure that keys for service account tokens can be rotated as needed, a separate public/private key pair should be used for signing service account tokens. The private key should be specified to the controller manager with `--service-account-private-key-file` as appropriate.

Solution

Edit the `/etc/kubernetes/controller-manager` file on the master node and set the `KUBE_CONTROLLER_MANAGER_ARGS` parameter to `--service-account-private-key-file=`: `KUBE_CONTROLLER_MANAGER_ARGS='--service-account-private-key-file='`

Based on your system, restart the `kube-controller-manager` service. For example: `systemctl restart kube-controller-manager.service`

Impact:

You would need to securely maintain the key file and rotate the keys based on your organization's key rotation policy.

See Also

https://workbench.cisecurity.org/files/1738

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(2), CSCv6|14

Plugin: Unix

Control ID: 8220556a16367dcd8061a533877b450ae1b2cd8ed7532db92608455f2374a8c0