1.4.2 Verify that the scheduler API service is protected by RBAC

Information

Do not bind the scheduler service to non-loopback insecure addresses.

Rationale:

The Scheduler API service which runs on port 10251/TCP by default is used for health and metrics information and is available without authentication or encryption. As such it should only be bound to a localhost interface, to minimize the cluster's attack surface

Impact:

None.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

None.

Default Value:

By default, the --bind-address parameter is not used and the metrics endpoint is protected by RBAC when using the pod IP address.

See Also

https://workbench.cisecurity.org/benchmarks/16094

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(3), 800-53|SC-7(4), CSCv7|9.2

Plugin: OpenShift

Control ID: 8a2031a1dbeab36507fede8496309e885740c0d0fe2ebe2ac8a81e0390c22794