4.2.9 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate

Information

Setup TLS connection on the Kubelets.

The connections from the apiserver to the kubelet are used for fetching logs for pods, attaching (through kubectl) to running pods, and using the kubelet's port-forwarding functionality. These connections terminate at the kubelet's HTTPS endpoint. By default, the apiserver does not verify the kubelet's serving certificate, which makes the connection subject to man-in-the-middle attacks, and unsafe to run over untrusted and/or public networks.

Solution

OpenShift automatically manages TLS authentication for the API server communication with the node/kublet This is not configurable.

Impact:

TLS and client certificate authentication must be configured for your Kubernetes cluster deployment.

See Also

https://workbench.cisecurity.org/benchmarks/19464

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-17(2), 800-53|IA-5, 800-53|IA-5(1), 800-53|SC-8, 800-53|SC-8(1), CSCv7|14.4

Plugin: OpenShift

Control ID: 9f5b40372bdd358e204e396fa8fe19cb99673c62bc644d3e157b012035e7a9d7