1.1.1 Ensure that the API server pod specification file permissions are set to 600 or more restrictive

Information

Ensure that the API server pod specification file has permissions of 600 or more restrictive.

Rationale:

The API server pod specification file controls various parameters that set the behavior of the API server. You should restrict its file permissions to maintain the integrity of the file. The file should be writable only by the administrators on the system.

Impact:

None.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

There is no remediation for updating the permissions of kube-apiserver-pod.yaml. The file is owned by an OpenShift operator and any changes to the file will result in a degraded cluster state.
Please do not attempt to remediate the permissions of this file.

Default Value:

By default, in OpenShift 4.14, the kube-apiserver-pod.yaml has permissions of 600.

In older versions of OpenShift, the kube-apiserver-pod.yaml has permissions of 644, and is not remediable. Please upgrade to OpenShift 4.14 when possible.

See Also

https://workbench.cisecurity.org/benchmarks/14166

Item Details

Category: ACCESS CONTROL, MEDIA PROTECTION

References: 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|MP-2, CSCv7|14.6

Plugin: OpenShift

Control ID: ca9f5102bc69ac7c7db0969e40c2858f8d55a83fbfac0b9c0e8f43c913c1a013