C-0096 - Ensure that the scheduler pod specification file permissions are set to 600 or more restrictive
Prerequisites
Run Kubescape with host sensor (see here)
Framework
cis-v1.23-t1.0.1
Severity
Medium
Description of the the issue
The scheduler pod specification file controls various parameters that set the behavior of the Scheduler service in the master node. You should restrict its file permissions to maintain the integrity of the file. The file should be writable by only the administrators on the system.
Related resources
What does this control test
Ensure that the scheduler pod specification file has permissions of 600
or more restrictive.
How to check it manually
Run the below command (based on the file location on your system) on the Control Plane node. For example,
stat -c %a /etc/kubernetes/manifests/kube-scheduler.yaml
Verify that the permissions are 600
or more restrictive.
Remediation
Run the below command (based on the file location on your system) on the Control Plane node. For example,
chmod 600 /etc/kubernetes/manifests/kube-scheduler.yaml
Impact Statement
None
Default Value
By default, kube-scheduler.yaml
file has permissions of 640
.
Example
No example
Updated 3 days ago