2.1.10 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - cert

Information

Setup TLS connection on the Kubelets.

Rationale:

Kubelet communication contains sensitive parameters that should remain encrypted in transit. Configure the Kubelets to serve only HTTPS traffic.

Solution

If using a Kubelet config file, edit the file to set 'tlsCertFile' to the location of the certificate file to use to identify this Kubelet, and 'tlsPrivateKeyFile' to the location of the corresponding private key file.

If using command line arguments, edit the kubelet service file '/etc/systemd/system/kubelet.service.d/10-kubeadm.conf' on each worker node and set the below parameters in 'KUBELET_CERTIFICATE_ARGS' variable.

--tls-cert-file=
--tls-private-key-file=

Based on your system, restart the 'kubelet' service. For example:

systemctl daemon-reload
systemctl restart kubelet.service

See Also

https://workbench.cisecurity.org/files/2421

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-8, CSCv6|14.2, CSCv7|14.4

Plugin: Unix

Control ID: a5b40d278963330fe1af32017aecc53be4e787060c472aedd6ecc37b1ed9b4cc