Details
While the Kubernetes dashboard is not inherently insecure on its own, it is often coupled with a misconfiguration of Role-Based Access control (RBAC) permissions that can unintentionally over-grant access. It is not commonly protected with ‘NetworkPolicies’, preventing all pods from being able to reach it. In increasingly rare circumstances, the Kubernetes dashboard is exposed publicly to the internet.
Solution
Delete the Kubernetes dashboard deployment with the following command:
kubectl delete deployment kubernetes-dashboard –namespace=kube-system
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.
References
- 800-53|AC-3
- CAT|II
- CCI|CCI-000213
- Rule-ID|SV-242395r712541_rule
- STIG-ID|CNTR-K8-000420
- Vuln-ID|V-242395