C-0096 - Ensure that the scheduler pod specification file permissions are set to 600 or more restrictive

Prerequisites

Run Kubescape with host sensor (see here)

Framework

cis-v1.23-t1.0.1

Severity

Medium

Description of the the issue

The scheduler pod specification file controls various parameters that set the behavior of the Scheduler service in the master node. You should restrict its file permissions to maintain the integrity of the file. The file should be writable by only the administrators on the system.

Related resources

What does this control test

Ensure that the scheduler pod specification file has permissions of 600 or more restrictive.

How to check it manually

Run the below command (based on the file location on your system) on the Control Plane node. For example,

stat -c %a /etc/kubernetes/manifests/kube-scheduler.yaml

Verify that the permissions are 600 or more restrictive.

Remediation

Run the below command (based on the file location on your system) on the Control Plane node. For example,

chmod 600 /etc/kubernetes/manifests/kube-scheduler.yaml

Impact Statement

None

Default Value

By default, kube-scheduler.yaml file has permissions of 640.

Example

No example