1.3.3 Ensure that the --service-account-private-key-file argument is set as appropriate

Information

Explicitly set a service account private key file for service accounts on the controller manager.

Rationale:

To ensure that keys for service account tokens can be rotated as needed, a separate public/private key pair should be used for signing service account tokens. The private key should be specified to the controller manager with --service-account-private-key-file as appropriate.

Impact:

You would need to securely maintain the key file and rotate the keys based on your organization's key rotation policy.

Solution

None.

Default Value:

By default, OpenShift starts the controller manager with service-account-private-key-file set to /etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key. OpenShift manages the service account credentials for the scheduler automatically.

See Also

https://workbench.cisecurity.org/benchmarks/16094

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1), CSCv7|4.4

Plugin: OpenShift

Control ID: 08adab998555a9debaaa1e3a295647d2c1170d36bcacbd4ffc1a679e4e1ee144