2.1.7 Ensure that the --protect-kernel-defaults argument is set to true

Information

Protect tuned kernel parameters from overriding kubelet default kernel parameter values.

Rationale:

Kernel parameters are usually tuned and hardened by the system administrators before putting the systems into production. These parameters protect the kernel and the system. Your kubelet kernel defaults that rely on such parameters should be appropriately set to match the desired secured system state. Ignoring this could potentially lead to running pods with undesired kernel behavior.

Solution

Edit the `/etc/kubernetes/kubelet` file on each node and set the `KUBELET_ARGS` parameter to `'--protect-kernel-defaults=true'`: `KUBELET_ARGS='--protect-kernel-defaults=true'`

Based on your system, restart the `kubelet` service. For example: `systemctl restart kubelet.service`

Impact:

You would have to re-tune kernel parameters to match kubelet parameters.

See Also

https://workbench.cisecurity.org/files/1738

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CSCv6|3

Plugin: Unix

Control ID: 7ba81f58781da1e8655fa65014659c12a34bf033365344e323cf25be379ccd5e