CNTR-K8-001360 - Kubernetes must separate user functionality.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Separating user functionality from management functionality is a requirement for all the components within the Kubernetes Control Plane. Without the separation, users may have access to management functions that can degrade the Kubernetes architecture and the services being offered, and can offer a method to bypass testing and validation of functions before introduced into a production environment.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Move any user pods that are present in the Kubernetes system namespaces to user specific namespaces.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Kubernetes_V1R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001082, Rule-ID|SV-242417r712607_rule, STIG-ID|CNTR-K8-001360, Vuln-ID|V-242417

Plugin: Unix

Control ID: ef3908f17847428a1578cfb4b5c90e2a3f5be1cab92069433c3ca96b6b4d14fe