Vulnerability Discussion
The secure configuration of the container platform must be protected by disallowing changes to be implemented by non-privileged users. Changes to the container platform can introduce security risks or stability issues and undermine change management procedures. Securing configuration files from non-privileged user modification can be enforced using file ownership and permissions.
Check
Review the container platform to verify that configuration files cannot be modified by non-privileged users.
If non-privileged users can modify configuration files, this is a finding.
Fix
Configure the container platform to only allow configuration modifications by privileged users.