Profile applicability: Level 1
Use https for kubelet connections.
Connections from 
apiserver to kubelets could potentially carry sensitive data such as secrets and keys. It is thus important
               to use in-transit encryption for any communication between the apiserver and kubelets.|  | NoteBy default, kubelet connections are encrypted. | 
Impact
You require TLS to be configured on 
apiserver as well as kubelets.Audit
OpenShift does not use the --kubelet-https argument. OpenShift utilizes X.509 certificates
                  for authentication of the control-plane components. OpenShift configures the API server
                  to use an internal certificate authority (CA) to validate the user certificate sent
                  during TLS negotiation. If the validation of the certificate is successful, the request
                  is authenticated and user information is derived from the certificate subject fields.
                  
To verify the kubelet client certificates are present, run the following command:
oc get configmap config -n openshift-kube-apiserver -ojson | jq -r '.data["config.yaml"]' | jq '.apiServerArguments["kubelet-client- certificate"]' oc get configmap config -n openshift-kube-apiserver -ojson | jq -r '.data["config.yaml"]' | jq '.apiServerArguments["kubelet-client-key"]' oc -n openshift-apiserver describe secret serving-cert # Run the following command and the output should return true or no output at all oc get configmap config -n openshift-kube-apiserver -ojson | jq -r '.data["config.yaml"]' | jq '.apiServerArguments["kubelet-https"]'
Verify that the kubelet client-certificate and kubelet client-key files are present.
                  
Client-certificate:
/etc/kubernetes/static-pod-resources/kube-apiserver-certs/secrets/kubelet-client/tls.crt
 Client-key:
/etc/kubernetes/static-pod-resources/kube-apiserver-certs/secrets/kubelet-client/tls.key
Verify that the serving-cert for the 
openshift-apiserver is type kubernetes.io/tls and that returned Data includes tls.crt and tls.key.Remediation
No remediation is required. OpenShift platform components use X.509 certificates for
                  authentication. OpenShift manages the CAs and certificates for platform components.
                  This is not configurable.
 
		