CNTR-K8-000220 - The Kubernetes Controller Manager must create unique service accounts for each work payload.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The Kubernetes Controller Manager is a background process that embeds core control loops regulating cluster system state through the API Server. Every process executed in a pod has an associated service account. By default, service accounts use the same credentials for authentication. Implementing the default settings poses a High risk to the Kubernetes Controller Manager. Setting the use-service-account-credential value lowers the attack surface by generating unique service accounts settings for each controller instance.

Solution

Edit the Kubernetes Controller Manager manifest file in the /etc/kubernetes/manifests directory on the Kubernetes Master Node. Set the value of 'use-service-account-credentials' to 'true'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Kubernetes_V1R6_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000015, Rule-ID|SV-242381r799981_rule, STIG-ID|CNTR-K8-000220, Vuln-ID|V-242381

Plugin: Unix

Control ID: 93eff463696f9c47053c01f0eb4ce8bdff937db90d93037bfda832d671927797