To maximize security at the Google Kubernetes Engine (GKE) cluster level, ensure that authentication using client certificates is disabled. Client certificates require key rotation for authentication. Therefore, it is highly recommended to use an alternative authentication method, such as OpenID Connect.
In Google Kubernetes Engine (GKE), clients can use base64-encoded public certificates for authentication. However, these certificates don't auto-rotate, are difficult to revoke, and present security management challenges. GKE's default authentication via gcloud uses the OpenID Connect token method, which is preferred as it handles token management automatically. Therefore, both basic authentication (with static passwords) and client certificate authentication are discouraged due to the overhead of key management and rotation. Disabling client certificate authentication does not prevent access, as other methods like OpenID Connect remain available.
Audit
To determine if authentication using client certificates is disabled for your Google Kubernetes Engine (GKE) clusters, perform the following operations:
Remediation / Resolution
To disable authentication with client certificates for your Google Kubernetes Engine (GKE) clusters, you must re-create your clusters without client certificates by performing the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Harden your cluster's security
- Create IAM allow policies
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud container clusters list
- gcloud container clusters describe
- gcloud container clusters create
- gcloud container clusters delete