STIGQter STIGQter: STIG Summary: Kubernetes Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 13 Apr 2021:

The Kubernetes Kube Proxy must have file permissions set to 644 or more restrictive.

DISA Rule

SV-242447r712697_rule

Vulnerability Number

V-242447

Group Title

SRG-APP-000516-CTR-001325

Rule Version

CNTR-K8-003140

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Change the permissions of the Kube Proxy to "644" by executing the command:

chown 644 <location from kubeconfig>.

Check Contents

Check if Kube-Proxy is running and obtain --kubeconfig parameter use the following command:
ps -ef | grep kube-proxy

If Kube-Proxy exists:
Review the permissions of the Kubernetes Kube Proxy by using the command:
stat -c %a <location from --kubeconfig>

If the file has permissions more permissive than "644", this is a finding.

Vulnerability Number

V-242447

Documentable

False

Rule Version

CNTR-K8-003140

Severity Override Guidance

Check if Kube-Proxy is running and obtain --kubeconfig parameter use the following command:
ps -ef | grep kube-proxy

If Kube-Proxy exists:
Review the permissions of the Kubernetes Kube Proxy by using the command:
stat -c %a <location from --kubeconfig>

If the file has permissions more permissive than "644", this is a finding.

Check Content Reference

M

Target Key

5376

Comments