CIS-1.1.15 - Ensure that the scheduler.conf file permissions are set to 600 or more restrictive

Ensure that the scheduler.conf file permissions are set to 600 or more restrictive

Note: to enable this control run Kubescape with host sensor (see here)

Framework

CIS

Severity

Medium

Description of the the issue

The scheduler.conf file is the kubeconfig file for the Scheduler. You should restrict its file permissions to maintain the integrity of the file. The file should be writable by only the administrators on the system.

Related resources

What does this control test

Ensure that the scheduler.conf file has permissions of 600 or more restrictive.

How to check it manually

Run the following command (based on the file location on your system) on the Control Plane node. For example,

stat -c %a /etc/kubernetes/scheduler.conf

Verify that the permissions are 600 or more restrictive.

Remediation

Run the below command (based on the file location on your system) on the Control Plane node. For example,

chmod 600 /etc/kubernetes/scheduler.conf

Impact Statement

None

Default Value

By default, scheduler.conf has permissions of 640.

Example

No example