4.2.12 Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers

Information

Ensure that the Kubelet is configured to only use strong cryptographic ciphers.

TLS ciphers have had a number of known vulnerabilities and weaknesses, which can reduce the protection provided by them. By default Kubernetes supports a number of TLS ciphersuites including some that have security concerns, weakening the protection provided.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Follow the directions above and in the OpenShift documentation to configure the tlsSecurityProfile . Configuring Ingress https://docs.openshift.com/container-platform/latest/networking/ingress-operator.html#nw-ingress-controller-configuration-parameters_configuring-ingress.

Please reference the OpenShift TLS security profile documentation https://docs.openshift.com/container-platform/latest/security/tls-security-profiles.html for more detail on each profile.

Impact:

Kubelet clients that cannot support modern cryptographic ciphers will not be able to make connections to the Kubelet API.

See Also

https://workbench.cisecurity.org/benchmarks/24114

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1), CSCv7|1.8, CSCv7|2.6

Plugin: OpenShift

Control ID: b3a27883b2614fbbdbc1b3d7a275164326be1309840b65ae4df7ec7924d34642