Ensure that your OCI Kubernetes Engine (OKE) cluster uses a Container Network Interface (CNI) plugin that supports network policies. Using a compliant CNI plugin is vital for controlling inter-pod communication and enforcing segmentation.
Kubernetes relies on the Container Network Interface (CNI) plugin to enforce network policies. If the CNI plugin in use does not natively support network policies, the ability to effectively restrict and segment cluster traffic is lost. Therefore, using the latest CNI plugin version is vital for maintaining compatibility with modern Kubernetes features, ensuring patches for critical networking vulnerabilities are applied, and guaranteeing robust enforcement of network policy rules.
Audit
To determine if the CNI plugin used by the OCI Kubernetes Engine (OKE) cluster supports network policies, perform the following operations:
Remediation / Resolution
To implement the Principle of Least Privilege (POLP), replace all uses of the wildcard (∗) in Roles and ClusterRoles with explicitly defined resources, verbs, and apiGroups. This will ensure that principals only possess the exact permissions necessary to perform their specific functions, thus preventing accidental or malicious privilege escalation.
References
- Oracle Cloud Infrastructure Documentation
- Overview of Kubernetes Engine (OKE)
- Managing Kubernetes Clusters
- Setting Up Cluster Access
- Accessing a Cluster Using Kubectl
- About Access Control and Kubernetes Engine (OKE)
- Example: Installing Calico and Setting Up Network Policies
- Oracle Cloud Infrastructure CLI Documentation
- compartment list
- cluster list
- cluster create-kubeconfig
- Kubernetes Documentation
- Network Plugins
- Installing Addons