1.4.2 Verify that the scheduler API service is protected by RBAC

Information

Do not bind the scheduler service to non-loopback insecure addresses.

Rationale:

The Scheduler API service which runs on port 10251/TCP by default is used for health and metrics information and is available without authentication or encryption. As such it should only be bound to a localhost interface, to minimize the cluster's attack surface

Impact:

None.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

None.

Default Value:

By default, the --bind-address parameter is not used and the metrics endpoint is protected by RBAC when using the pod IP address.

See Also

https://workbench.cisecurity.org/benchmarks/14166

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(3), 800-53|SC-7(4), CSCv7|9.2

Plugin: OpenShift

Control ID: 52d378a1e1c42b0e43273c237eb2156e7ee0df809865ea6392acc1fb2d7d6560