Views:
Profile applicability: Level 1
Do not allow all requests. Enable explicit authorization.
Kubelets can be configured to allow all authenticated requests (even anonymous ones) without needing explicit authorization checks from the apiserver. You should restrict this behavior and only allow explicitly authorized requests.
Note
Note
See the GKE documentation for the default value.

Impact

See the GKE documentation for the default value.

Audit

Audit Method 1:
Kubelets can accept configuration from a configuration file and in some cases from command line arguments. It is important to note that parameters provided as command line arguments will override their counterpart parameters in the configuration file (see --config details in the Kubelet CLI Reference for more info, where you can also find out which configuration parameters can be supplied as a command line argument). With this in mind, it is important to check for the existence of command line arguments as well as configuration file entries when auditing Kubelet configuration.
  1. SSH to each node and execute the following command to find the Kubelet process:
    ps -ef | grep kubelet
    The output of the above command provides details of the active Kubelet process, from which we can see the command line arguments provided to the process. Also note the location of the configuration file, provided with the --config argument, as this will be needed to verify configuration.
  2. The file can be viewed with a command like more or less:
    sudo less /path/to/kubelet-config.json
  3. Verify that Webhook Authentication is enabled. This may be configured as a command line argument to the kubelet service with --authentication-token-webhook or in the kubelet configuration file with "authentication": { "webhook": { "enabled": true } }.
  4. Verify that the Authorization Mode is set to WebHook. This may be set as a command line argument to the kubelet service with --authorization-mode=Webhook or in the configuration file with "authorization": { "mode": "Webhook }.
Audit Method 2:
It is also possible to review the running configuration of a Kubelet via the /configz endpoint of the Kubernetes API. Use kubectl to proxy your requests to the API.
  1. Discover all nodes in your cluster by running the following command:
    kubectl get nodes
  2. Initiate a proxy with kubectl on a local port of your choice, like:
    kubectl proxy --port=8080
  3. With this running, in a separate terminal run the following command for each node:
    export NODE_NAME=my-node-name 
    curl http://localhost:8080/api/v1/nodes/${NODE_NAME}/proxy/configz
    The curl command will return the API response which will be a JSON formatted string representing the Kubelet configuration.
  4. Verify that Webhook Authentication is enabled with "authentication": { "webhook": { "enabled": true } } is in the API response.
  5. Verify that the Authorization Mode is set to WebHook with "authorization": { "mode": "Webhook } in the API response.

Remediation

Remediation Method 1:
If configuring via the Kubelet config file, first locate the file:
  1. SSH to each node and execute the following command to find the kubelet process:
    ps -ef | grep kubelet
    The output of the above command provides details of the active kubelet process, from which we can see the location of the configuration file provided to the kubelet service with the --config argument.
  2. The file can be viewed with a command like more or less:
    sudo less /path/to/kubelet-config.json
  3. Enable Webhook Authentication by setting the following parameter:
    "authentication": { "anonymous": { "enabled": false } }
  4. Next, set the Authorization Mode to Webhook by setting the following parameter:
    "authorization": { "mode": "Webhook }
    Finer detail of the authentication and authorization fields can be found in the Kubelet Configuration documentation.
Remediation Method 2:
  1. If using executable arguments, edit the kubelet service file on each worker node and ensure the below parameters are part of the KUBELET_ARGS variable string.
  2. For systems using systemd, such as the Amazon EKS Optimized Amazon Linux or Bottlerocket AMIs, then this file can be found at /etc/systemd/system/kubelet.service.d/10-kubelet-args.conf.
  3. Otherwise, you may need to look up documentation for your chosen operating system to determine which service manager is configured:
    --authentication-token-webhook
    --authorization-mode=Webhook
For Both Remediation Steps:
Based on your system, restart the kubelet service and check the service status. The following example is for operating systems using systemd, such as the Amazon EKS Optimised Amazon Linux or Bottlerocket AMIs, and invokes the systemctl command. If systemctl is not available then you will need to look up documentation for your chosen operating system to determine which service manager is configured:
systemctl daemon-reload 
systemctl restart kubelet.service 
systemctl status kubelet -l