CNTR-K8-000220 - The Kubernetes Controller Manager must create unique service accounts for each work payload.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The Kubernetes Controller Manager is a background process that embeds core control loops regulating cluster system state through the API Server. Every process executed in a pod has an associated service account. By default, service accounts use the same credentials for authentication. Implementing the default settings poses a High risk to the Kubernetes Controller Manager. Setting the '--use-service-account-credential' value lowers the attack surface by generating unique service accounts settings for each controller instance.

Solution

Edit the Kubernetes Controller Manager manifest file in the /etc/kubernetes/manifests directory on the Kubernetes Control Plane.

Set the value of '--use-service-account-credentials' to 'true'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Kubernetes_V1R11_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000015, Rule-ID|SV-242381r927239_rule, STIG-ID|CNTR-K8-000220, Vuln-ID|V-242381

Plugin: Unix

Control ID: 51148663141f15dc164fb6ac95558ea58878f47d85ed1774537e7e8f887745a6