CNTR-K8-001161 - Sensitive information must be stored using Kubernetes Secrets or an external Secret store provider.

Information

Sensitive information, such as passwords, keys, and tokens must not be stored in application code.

Kubernetes offers a resource called Secrets that are designed for storing sensitive information for use by applications. Secrets are created and managed separately from application code. Additionally, they can be encrypted at rest and access to the secrets can be controlled via RBAC.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Any sensitive information found must be stored in an approved external Secret store provider or use Kubernetes Secrets (attached on an as-needed basis to pods).

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Kubernetes_V2R4_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(d), CAT|I, CCI|CCI-004062, Rule-ID|SV-274883r1107230_rule, STIG-ID|CNTR-K8-001161, Vuln-ID|V-274883

Plugin: Unix

Control ID: d97be3f1a1e11c95a549a4034bc28618fd22bab685469b633de15ce600785e66