1.3.5 Ensure that the --root-ca-file argument is set as appropriate

Information

Allow pods to verify the API server's serving certificate before establishing connections.

Rationale:

Processes running within pods that need to contact the API server must verify the API server's serving certificate. Failing to do so could be a subject to man-in-the-middle attacks.

Providing the root certificate for the API server's serving certificate to the controller manager with the '--root-ca-file' argument allows the controller manager to inject the trusted bundle into pods so that they can verify TLS connections to the API server.

Solution

Edit the Controller Manager pod specification file '/etc/kubernetes/manifests/kube-controller-manager.yaml' on the master node and set the '--root-ca-file' parameter to the certificate bundle file'.

--root-ca-file=

Impact:

You need to setup and maintain root certificate authority file.

See Also

https://workbench.cisecurity.org/files/1788

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(2), CSCv6|14.2

Plugin: Unix

Control ID: d343e016f522fe50b4474387206d4d7d472977c4d396fa44eeaef5ee566b71e9