STIGQter STIGQter: STIG Summary: Kubernetes Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 13 Apr 2021:

Kubernetes endpoints must use approved organizational certificate and key pair to protect information in transit.

DISA Rule

SV-242441r712679_rule

Vulnerability Number

V-242441

Group Title

SRG-APP-000516-CTR-001325

Rule Version

CNTR-K8-002640

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the Kubernetes API Server manifest file in the /etc/kubernetes/manifests directory on the Kubernetes Master Node. Set the value of "--kubelet-client-certificate" and "--kubelet-client-key" to an Approved Organizational Certificate and key pair.

Check Contents

Change to the /etc/kubernetes/manifests/ directory on the Kubernetes Master Node. Run the command:

grep -i kubelet-client-certificate *
grep -I kubelet-client-key *

If the setting "--kubelet-client-certificate" is not configured in the Kubernetes API server manifest file or contains no value, this is a finding.

If the setting "--kubelet-client-key" is not configured in the Kubernetes API server manifest file or contains no value, this is a finding.

Vulnerability Number

V-242441

Documentable

False

Rule Version

CNTR-K8-002640

Severity Override Guidance

Change to the /etc/kubernetes/manifests/ directory on the Kubernetes Master Node. Run the command:

grep -i kubelet-client-certificate *
grep -I kubelet-client-key *

If the setting "--kubelet-client-certificate" is not configured in the Kubernetes API server manifest file or contains no value, this is a finding.

If the setting "--kubelet-client-key" is not configured in the Kubernetes API server manifest file or contains no value, this is a finding.

Check Content Reference

M

Target Key

5376

Comments