CNTR-K8-001160 - Secrets in Kubernetes must not be stored as environment variables.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Secrets, such as passwords, keys, tokens, and certificates should not be stored as environment variables. These environment variables are accessible inside Kubernetes by the 'Get Pod' API call, and by any system, such as CI/CD pipeline, which has access to the definition file of the container. Secrets must be mounted from files or stored within password vaults.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Any secrets stored as environment variables must be moved to the secret files with the proper protections and enforcements or placed within a password vault.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Kubernetes_V1R8_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000196, Rule-ID|SV-242415r863991_rule, STIG-ID|CNTR-K8-001160, Vuln-ID|V-242415

Plugin: Unix

Control ID: 4eca05af33d231b8b4030dfddb9984ae56306a5720fc4aba9de15adabdcf9607