1. Home
  2. Security Hardening
  3. CIS Kubernetes 1.11 Benchmark V1.3.0 L1
  4. Ensure that the –address argument is set to 127.0.0.1

Ensure that the –address argument is set to 127.0.0.1

Details

Do not bind the scheduler service to non-loopback insecure addresses.

Rationale:

The Scheduler API service which runs on port 10251/TCP by default is used for health and metrics information and is available without authentication or encryption. As such it should only be bound to a localhost interface, to minimize the cluster’s attack surface

Solution

Edit the Scheduler pod specification file /etc/kubernetes/manifests/kube-scheduler.yaml on the master node and ensure the correct value for the –address parameter

Impact:

None

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles