Checks whether public endpoints are configured for the API server in each Container Service for Kubernetes (ACK) cluster.
Scenario
If you configure public endpoints for the API server in an ACK cluster, your resources, such as pods, Services, and ReplicaControllers, may face attacks from the Internet. Therefore, we recommend that you do not configure public endpoints for the API server.
Risk level
Default risk level: high.
You can change the risk level as required when you apply this rule.
Compliance evaluation logic
- If no public endpoints are configured for the API server in each ACK cluster, the evaluation result is compliant.
- If public endpoints are configured for the API server in an ACK cluster, the evaluation result is non-compliant. For more information about how to correct the non-compliant configuration, see Non-compliance remediation.
Rule details
Item | Description |
---|---|
Rule name | ack-cluster-public-endpoint-check |
Rule ID | ack-cluster-public-endpoint-check |
Tag | ACK |
Automatic remediation | Not supported |
Trigger type | Periodic execution |
Time interval | 24 hours |
Supported resource type | ACK cluster |
Input parameter | None |
Non-compliance remediation
Disassociate all elastic IP addresses (EIPs) with the API server in the ACK cluster. For more information, see Control public access to the API server of a cluster.