CNTR-K8-000960 - The Kubernetes cluster must use non-privileged host ports for user pods.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Privileged ports are those ports below 1024 and that require system privileges for their use. If containers can use these ports, the container must be run as a privileged user. Kubernetes must stop containers that try to map to these ports directly. Allowing non-privileged ports to be mapped to the container-privileged port is the allowable method when a certain port is needed. An example is mapping port 8080 externally to port 80 in the container.

Solution

For any of the pods that are using host-privileged ports, reconfigure the pod to use a service to map a host non-privileged port to the pod port or reconfigure the image to use non-privileged ports.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Kubernetes_V1R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000382, Rule-ID|SV-242414r717030_rule, STIG-ID|CNTR-K8-000960, Vuln-ID|V-242414

Plugin: Unix

Control ID: 7fd2cf3f96a8ae2c299b7ab575c1a7e27cf53ca188de224f0a75039c3fd9e8db