1.1.11 Ensure that the etcd data directory permissions are set to 700 or more restrictive

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Ensure that the etcd data directory has permissions of 700 or more restrictive.

Rationale:

etcd is a highly-available key-value store used by Kubernetes deployments for persistent storage of all of its REST API objects. This data directory should be protected from any unauthorized reads or writes. It should not be readable or writable by any group members or the world.

Solution

On the etcd server node, get the etcd data directory, passed as an argument --data-dir, from the below command:

ps -ef | grep etcd

Run the below command (based on the etcd data directory found above). For example,

chmod 700 /var/lib/etcd

Impact:

None

Default Value:

By default, etcd data directory has permissions of 755.

References:

https://coreos.com/etcd/docs/latest/op-guide/configuration.html#data-dir

https://kubernetes.io/docs/admin/etcd/

See Also

https://workbench.cisecurity.org/files/2662

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CSCv6|14, CSCv7|5.2

Plugin: Unix

Control ID: 17a423861c03d7e8ccc32eaa23d67ac1241aab586ef000543275f1bf8f4ace8f