Kubeadm is a powerful tool used to initialize and manage Kubernetes clusters, but its misuse can lead to significant security and operational risks. Unauthorized access to kubeadm commands can:
Cluster Compromise Through Unauthorized Node Additions: The kubeadm token create --print-join-command command generates join tokens, allowing nodes (masters or workers) to be added to the cluster. Unauthorized use of this command can lead to unauthorized nodes being added, potentially compromising the cluster’s integrity and security.
Cluster Disruption Through Node Resets: The kubeadm reset command removes all Kubernetes components from a node. On a master node, this can lead to complete cluster failure or even destruction of the cluster, making misuse of this command a high security risk.
To mitigate these risks, restricting access to kubeadm commands is essential.