Information
Ensure that the Kubelet is configured to only use strong cryptographic ciphers.
TLS ciphers have had a number of known vulnerabilities and weaknesses, which can reduce the protection provided by them. By default Kubernetes supports a number of TLS ciphersuites including some that have security concerns, weakening the protection provided.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Follow the directions above and in the OpenShift documentation to configure the tlsSecurityProfile . Configuring Ingress https://docs.openshift.com/container-platform/latest/networking/ingress-operator.html#nw-ingress-controller-configuration-parameters_configuring-ingress.
Please reference the OpenShift TLS security profile documentation https://docs.openshift.com/container-platform/latest/security/tls-security-profiles.html for more detail on each profile.
Impact:
Kubelet clients that cannot support modern cryptographic ciphers will not be able to make connections to the Kubelet API.