7.8 Ensure that node certificates are rotated as appropriate

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

You should rotate swarm node certificates in line with your organizational security policy.

Rationale:

Docker Swarm uses TLS for clustering operations between its nodes. Certificate rotation ensures that in an event such as a compromised node or key, it is difficult to impersonate a node. By default, node certificates are rotated every 90 days, but you should rotate them more often or as appropriate in your environment.

Solution

You should run the command to set the desired expiry time on the node certificate.
For example:

docker swarm update --cert-expiry 48h

Impact:

None

Default Value:

By default, node certificates are rotated automatically every 90 days.

See Also

https://workbench.cisecurity.org/files/2433

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-12, CSCv6|14.2, CSCv7|14.4

Plugin: Unix

Control ID: 938b43993822172355cc1e4d73aadd9a5e9918a5a480deb4a3dcc1eb9ce81c56