1.2.32 Ensure that the API Server only makes use of Strong Cryptographic Ciphers

Information

Ensure that the API server is configured to only use strong cryptographic ciphers.

Rationale:

TLS ciphers have had a number of known vulnerabilities and weaknesses, which can reduce the protection provided by them. By default Kubernetes supports a number of TLS ciphersuites including some that have security concerns, weakening the protection provided.

Impact:

API server clients that cannot support the custom cryptographic ciphers will not be able to make connections to the API server.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

None.

Default Value:

By default, OpenShift uses the Intermediate TLS profile, which requires a minimum of TLS 1.2.

You can configure TLS security profiles by following the OpenShift TLS documentation.

See Also

https://workbench.cisecurity.org/benchmarks/14166

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, 800-53|CM-7, CSCv7|1.8

Plugin: OpenShift

Control ID: f2cbdc7d728000c906474fcd63ca77470aaf992ee031801da7585be70a3d25c7