CIS-1.1.1 - Ensure that the API server pod specification file permissions are set to 600 or more restrictive

Ensure that the API server pod specification file permissions are set to 600 or more restrictive

Note: to enable this control run Kubescape with host sensor (see here)

Framework

CIS

Severity

Medium

Description of the the issue

The API server pod specification file controls various parameters that set the behavior of the API server. You should restrict its file permissions to maintain the integrity of the file. The file should be writable by only the administrators on the system.

Related resources

What does this control test

Ensure that the API server pod specification file has permissions of 600 or more restrictive.

How to check it manually

Run the below command (based on the file location on your system) on the Control Plane node. For example,

stat -c %a /etc/kubernetes/manifests/kube-apiserver.yaml

Verify that the permissions are 600 or more restrictive.

Remediation

Run the below command (based on the file location on your system) on the Control Plane node. For example,

chmod 600 /etc/kubernetes/manifests/kube-apiserver.yaml

Impact Statement

None

Default Value

By default, the kube-apiserver.yaml file has permissions of 640.

Example

No example