The Kubernetes kubeadm.conf must be owned by root.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-242454 | SRG-APP-000516-CTR-001325 | CNTR-K8-003210 | SV-242454r961863_rule | 2025-02-20 | 2 |
Description |
---|
The Kubernetes kubeeadm.conf contains sensitive information regarding the cluster nodes configuration. If this file can be modified, the Kubernetes Platform Plane would be degraded or compromised for malicious intent. Many of the security settings within the document are implemented through this file. |
ℹ️ Check |
---|
Review the Kubeadm.conf file : Get the path for Kubeadm.conf by running: sytstemctl status kubelet Note the configuration file installed by the kubeadm is written to (Default Location: /etc/systemd/system/kubelet.service.d/10-kubeadm.conf) stat -c %U:%G <kubeadm.conf path> | grep -v root:root If the command returns any non root:root file permissions, this is a finding. |
✔️ Fix |
---|
Change the ownership of the kubeadm.conf to root: root by executing the command: chown root:root <kubeadm.conf path> |