1.4.2 Verify that the scheduler API service is protected by RBAC

Information

Do not bind the scheduler service to non-loopback insecure addresses.

The Scheduler API service which runs on port 10251/TCP by default is used for health and metrics information and is available without authentication or encryption. As such it should only be bound to a localhost interface, to minimize the cluster's attack surface

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

None.

Impact:

None.

See Also

https://workbench.cisecurity.org/benchmarks/19464

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(3), 800-53|SC-7(4), CSCv7|9.2

Plugin: OpenShift

Control ID: ef6c6ba0a3bffb3ef94c4508f14b2456ca98c94a9fd2412f1392ae4732111bfe