V-274882—Kubernetes Secrets must be encrypted at rest.
>Control Description
>Check Content
Change to the /etc/kubernetes/manifests directory on the Kubernetes Master Node.
$grep -i encryption-provider-config *If the setting "encryption-provider-config" is not configured, this is a finding. If the setting is configured, check the contents of the file specified by its argument. If the file does not specify the Secret's resource, this is a finding. If the identity provider is specified as the first provider for the resource, this is also a finding.
>Remediation
Edit the Kubernetes API Server manifest file in the /etc/kubernetes/manifests directory on the Kubernetes Master Node. Set the value of "--encryption-provider-config" to the path to the encryption config. The encryption config must specify the Secret's resource and provider. Below is an example: { "kind": "EncryptionConfiguration", "apiVersion": "apiserver.config.k8s.io/v1", "resources": [ { "resources": [ "secrets" ], "providers": [ { "aescbc": { "keys": [ { "name": "aescbckey", "secret": "xxxxxxxxxxxxxxxxxxx" } ] } }, { "identity": {} } ] } ] }
>CCI References
Control Correlation Identifiers (CCIs) map STIG findings to NIST 800-53 controls.
>Cross-Framework Mappings
NIST SP 800-53 r5
via DISA CCI ListAsk AI
Configure your API key to use AI features.