More Info:

Ensures private cluster is enabled for all Kubernetes clusters. Kubernetes private clusters only have internal ip ranges, which ensures that their workloads are isolated from the public internet.

Risk Level

Medium

Address

Security

Compliance Standards

HITRUST, SOC2, NISTCSF, PCIDSS

Triage and Remediation

Remediation

To remediate the “Private Cluster Should Be Enabled” misconfiguration in GCP using the GCP console, follow these steps:

  1. Open the GCP Console and navigate to the Kubernetes Engine page.
  2. Select the cluster that you want to remediate and click on the “Edit” button.
  3. Scroll down to the “Networking” section and click on “Show advanced options”.
  4. Under “Private cluster”, select the checkbox for “Enable private endpoint”.
  5. Optionally, you can also enable “Private nodes” and “Private endpoint with DNS zone”.
  6. Click on “Save” to apply the changes.

By enabling private endpoint in GCP Kubernetes Engine, you are ensuring that your cluster is only accessible from a private IP address range and not from the public internet. This will help to protect your cluster from unauthorized access and potential security threats.

Additional Reading: