1.1.13 Ensure that the admission control policy is set to DenyEscalatingExec

Information

Deny execution of `exec` and `attach` commands in privileged pods.

Rationale:

Setting admission control policy to `DenyEscalatingExec` denies `exec` and `attach` commands to pods that run with escalated privileges that allow host access. This includes pods that run as privileged, have access to the host IPC namespace, and have access to the host PID namespace.

Solution

Edit the `/etc/kubernetes/apiserver` file on the master node and set the `KUBE_ADMISSION_CONTROL` parameter to `'--admission-control=...,DenyEscalatingExec,...'`: `KUBE_ADMISSION_CONTROL='--admission-control=...,DenyEscalatingExec,...'`

Based on your system, restart the `kube-apiserver` service. For example: `systemctl restart kube-apiserver.service`

Impact:

`exec` and `attach` commands will not work in privileged pods.

See Also

https://workbench.cisecurity.org/files/1738

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CSCv6|14

Plugin: Unix

Control ID: ead10d0c5dd4c3bd68dc34c873025b4c7e361c8d52319becf6eff4c4da882ec1