Ensure that the expiration date is set on all keys

Property
Languageterraform
Severitymedium
Servicekeyvault
ProviderAzure
Vulnerability Typeomission

Description

Vault keys are created without an expiration date, allowing them to remain valid indefinitely. This increases the risk that old or unused keys continue to provide access beyond their intended lifecycle.

Impact

Keys without expiration dates can be exploited if compromised, as they never become inactive. This prolonged validity expands the attack surface, making it easier for attackers to use stolen or forgotten keys to access sensitive data or resources.

Ensure that the Kubernetes PKI certificate file permission is set to 600

Property
Languageterraform
Severityhigh

Description

The Kubernetes PKI certificate files have permissions set to allow access by users other than the file owner, rather than being restricted to 600. This misconfiguration exposes sensitive certificate data to unauthorized users on the system.

Impact

If exploited, unauthorized local users could read or copy Kubernetes PKI certificates, enabling them to impersonate cluster components, intercept secure communications, or escalate privileges within the cluster, potentially compromising the entire Kubernetes environment.

Ensure that the RotateKubeletServerCertificate argument is set to true

Property
Languageterraform
Severitylow

Description

The kube-controller-manager is not configured to enable automatic rotation of kubelet server certificates. Without this setting, kubelet certificates are not automatically renewed, which can lead to the use of outdated or compromised credentials.

Impact

If certificate rotation is not enabled, expired or potentially compromised kubelet server certificates may remain in use, increasing the risk of unauthorized access or disruption of secure communication within the Kubernetes cluster.