CNTR-K8-000220 - The Kubernetes Controller Manager must create unique service accounts for each work payload.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The Kubernetes Controller Manager is a background process that embeds core control loops regulating cluster system state through the API Server. Every process executed in a pod has an associated service account. By default, service accounts use the same credentials for authentication. Implementing the default settings poses a High risk to the Kubernetes Controller Manager. Setting the '--use-service-account-credential' value lowers the attack surface by generating unique service accounts settings for each controller instance.

Solution

Edit the Kubernetes Controller Manager manifest file in the /etc/kubernetes/manifests directory on the Kubernetes Control Plane.

Set the value of '--use-service-account-credentials' to 'true'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Kubernetes_V2R1_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000015, Rule-ID|SV-242381r960768_rule, STIG-ID|CNTR-K8-000220, Vuln-ID|V-242381

Plugin: Unix

Control ID: 760a754dfce7e6f1328c0bc0dc8b3f9befda1850aeac62df8c6cf5271033535c