Fix all issues via configuration and restart the affected components to ensure the new setting takes effect. Fix all of the following violations that were found against the API server:- a. Ensure that the RotateKubeletServerCertificate argument is set to true. b. Ensure that the admission control plugin PodSecurityPolicy is set. c. Ensure that the --kubelet-certificate-authority argument is set as appropriate. Fix all of the following violations that were found against the Kubelet:- a. Ensure the --anonymous-auth argument is set to false. b. Ensure that the --authorization-mode argument is set to Webhook. Fix all of the following violations that were found against the ETCD:- a. Ensure that the --auto-tls argument is not set to true b. Ensure that the --peer-auto-tls argument is not set to true Hint: Take the use of Tool Kube-Bench
I see why some pick False due to PodSecurityPolicy being deprecated, but given the question asks to fix all violations (and doesn't restrict to only supported configs), True makes sense. Most CIS hardening checks still reference these settings for compatibility. The deprecation's a trap here I think. Anyone disagree?
Looks like True to me. Every config listed matches what's required by CIS benchmarks and what kube-bench flags, even if PodSecurityPolicy is deprecated now. The question just wants you to correct the settings as stated, not debate deprecation status. Pretty sure that's what they're testing for but open to hear if anyone disagrees.
Looks like all those flags and settings match CIS benchmark recommendations, so I'd say True. PodSecurityPolicy is deprecated but the question accepts it, so it's probably fine here. If they meant Pod Security Admission instead, maybe slight difference but overall the steps are solid hardening. Pretty sure about this, but happy to hear a different view.