1.2.17 Ensure that the admission control plugin NodeRestriction is set

Information

Limit the Node and Pod objects that a kubelet could modify.

Rationale:

Using the NodeRestriction plug-in ensures that the kubelet is restricted to the Node and Pod objects that it could modify as defined. Such kubelets will only be allowed to modify their own Node API object, and only modify Pod API objects that are bound to their node.

Impact:

None

Solution

Follow the Kubernetes documentation and configure NodeRestriction plug-in on kubelets. Then, edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml on the master node and set the --enable-admission-plugins parameter to a value that includes NodeRestriction.

--enable-admission-plugins=...,NodeRestriction,...

Default Value:

By default, NodeRestriction is not set.

See Also

https://workbench.cisecurity.org/files/2968

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2, CSCv6|14, CSCv7|4

Plugin: Unix

Control ID: 61bdbd4e09982cbaec2c01e9531da6aedc29dae1e451d4ed0f11645fd0b09ca4