Ensure that the certificate authorities file permissions are set to 600 or more restrictive

Property
Languageterraform
Severitycritical

Description

The certificate authorities file is configured with permissions that are too permissive, allowing access beyond the file owner. This increases the risk that unauthorized users or processes could read or modify sensitive certificate data.

Impact

If exploited, unauthorized individuals could gain access to trusted certificate information, potentially enabling man-in-the-middle attacks, interception of encrypted traffic, or unauthorized system access. This undermines the security of authentication and encrypted communications across the environment.

Ensure that the client certificate authorities file ownership is set to root:root

Property
Languageterraform
Severitycritical

Description

The client certificate authorities file is not owned by root:root, which allows unauthorized users or processes to modify trusted CA certificates. This misconfiguration undermines the trust model of certificate-based authentication.

Impact

If exploited, attackers could replace or tamper with CA certificates, enabling them to intercept, decrypt, or impersonate secure communications within the cluster, potentially leading to privilege escalation or total compromise of the environment.

Ensure that the controller-manager config file permissions are set to 600 or more restrictive

Property
Languageterraform
Severityhigh

Description

The controller-manager configuration file has overly permissive permissions, allowing unauthorized users to read or modify its contents. Secure file permissions (600 or more restrictive) are not enforced, exposing sensitive configuration data.

Impact

If exploited, attackers with local access could read or alter the controller-manager’s configuration, potentially gaining control over cluster operations or disrupting Kubernetes functionality, leading to privilege escalation or denial of service.

Ensure that the etcd data directory ownership is set to etcd:etcd

Property
Languageterraform
Severitylow

Description

The etcd data directory (/var/lib/etcd) is not owned by the etcd user and group, which allows unauthorized users or processes to access or modify its contents. This misconfiguration undermines the integrity and confidentiality of etcd data.

Impact

If exploited, unauthorized users or processes could read, modify, or delete etcd database files, potentially leading to compromise of sensitive cluster data, disruption of cluster operations, or escalation of privileges within the Kubernetes environment.

Ensure that the etcd data directory permissions are set to 700 or more restrictive

Property
Languageterraform
Severitylow

Description

The etcd data directory is configured with overly permissive permissions, allowing access to users other than the owner. This increases the risk of unauthorized read or write access to sensitive cluster data.

Impact

If exploited, unauthorized users on the host could access or modify etcd data, potentially leading to compromise of Kubernetes secrets, cluster configuration, or denial of service, undermining the entire cluster’s security.