Under active development Content is continuously updated and improved

V-242408The Kubernetes manifest files must have least privileges.

CAT II - Medium
CNTR-K8-000900

>Control Description

The manifest files contain the runtime configuration of the API server, scheduler, controller, and etcd. If an attacker can gain access to these files, changes can be made to open vulnerabilities and bypass user authorizations inherent within Kubernetes with RBAC implemented. Satisfies: SRG-APP-000133-CTR-000310, SRG-APP-000133-CTR-000295, SRG-APP-000516-CTR-001335

>Check Content

On both Control Plane and Worker Nodes, change to the /etc/kubernetes/manifest directory.

$ls -l * Each manifest file must have permissions "644" or more restrictive.

If any manifest file is less restrictive than "644", this is a finding.

>Remediation

On both Control Plane and Worker Nodes, change to the /etc/kubernetes/manifest directory.

$chmod 644 * To verify the change took place,
$ls -l * All the manifest files should now have privileges of "644".

>CCI References

Control Correlation Identifiers (CCIs) map STIG findings to NIST 800-53 controls.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.