1.1.5 Ensure that the scheduler pod specification file permissions are set to 600 or more restrictive

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Ensure that the scheduler pod specification file has permissions of 600 or more restrictive.

Rationale:

The scheduler pod specification file controls various parameters that set the behavior of the Scheduler service in the master node. You should restrict its file permissions to maintain the integrity of the file. The file should be writable by only the administrators on the system.

Impact:

None.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

There is no remediation for updating the permissions of kube-scheduler-pod.yaml. The file is owned by an OpenShift operator and any changes to the file will result in a degraded cluster state.
Please do not attempt to remediate the permissions of this file.

Default Value:

By default, in OpenShift 4.14, the kube-scheduler-pod.yaml has permissions of 600.

In older versions of OpenShift, the kube-scheduler-pod.yaml has permissions of 644, and is not remediable. Please upgrade to OpenShift 4.14 when possible.

See Also

https://workbench.cisecurity.org/files/4460