V-242408—The Kubernetes manifest files must have least privileges.
CAT II - Medium
CNTR-K8-000900
>Control Description
The manifest files contain the runtime configuration of the API server, scheduler, controller, and etcd. If an attacker can gain access to these files, changes can be made to open vulnerabilities and bypass user authorizations inherent within Kubernetes with RBAC implemented. Satisfies: SRG-APP-000133-CTR-000310, SRG-APP-000133-CTR-000295, SRG-APP-000516-CTR-001335
>Check Content
On both Control Plane and Worker Nodes, change to the /etc/kubernetes/manifest directory.
$ls -l * Each manifest file must have permissions "644" or more restrictive.If any manifest file is less restrictive than "644", this is a finding.
>Remediation
On both Control Plane and Worker Nodes, change to the /etc/kubernetes/manifest directory.
$chmod 644 * To verify the change took place,$ls -l * All the manifest files should now have privileges of "644".>CCI References
Control Correlation Identifiers (CCIs) map STIG findings to NIST 800-53 controls.
>Cross-Framework Mappings
NIST SP 800-53 r5
via DISA CCI ListAsk AI
Configure your API key to use AI features.