Restrict control plane access to your Google Kubernetes Engine (GKE) clusters to private endpoints only, effectively disabling external access to the Kubernetes API. This requires configuring the GKE cluster with private nodes, a private master IP range, and IP aliasing.
This rule resolution is part of the Conformity solution.
While Kubernetes API requires authentication tokens for sensitive actions, a vulnerability could expose it with unrestricted access. Moreover, attackers could potentially identify the cluster and Kubernetes API version to check for known vulnerabilities. Disabling the public endpoint, unless explicitly required, mitigates these risks by requiring attackers to be within the master's VPC network to target the Kubernetes API.
Audit
To determine if your Google Kubernetes Engine (GKE) clusters are using private endpoints only for control plane access, perform the following operations:
Remediation / Resolution
To ensure that your Google Kubernetes Engine (GKE) clusters are using private endpoints only for control plane access, you must re-create your clusters with the appropriate networking configuration, as described below:
References
- Google Cloud Platform (GCP) Documentation
- Harden your cluster's security
- Customize your network isolation in GKE
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud container clusters list
- gcloud container clusters describe
- gcloud container clusters create
- gcloud container clusters delete