Vulnerability Discussion
The secure configuration of the container platform must be protected by disallowing changing to be implemented by non-privileged users. Changes to the container platform can introduce security risks and stability issues and undermine change management procedures. To secure authentication files from non-privileged user modification can be enforced using file ownership and permissions.
Examples of authentication files are keys, certificates, and tokens.
Check
Review the container platform to verify that authentication files cannot be modified by non-privileged users.
If non-privileged users can modify key and certificate files, this is a finding.
Fix
Configure the container platform to only allow authentication file modifications by privileged users.