1.2.33 Ensure that the --encryption-provider-config argument is set as appropriate

Information

Encrypt etcd key-value store.

Rationale:

etcd is a highly available key-value store used by Kubernetes deployments for persistent storage of all of its REST API objects. These objects are sensitive in nature and should be encrypted at rest to avoid any disclosures.

Solution

Follow the Kubernetes documentation and configure a EncryptionConfig file. Then, edit the API server pod specification file /etc/kubernetes/manifests/kube-apiserver.yaml on the master node and set the --encryption-provider-config parameter to the path of that file:

--encryption-provider-config=</path/to/EncryptionConfig/File>

Impact:

None

Default Value:

By default, --encryption-provider-config is not set.

References:

https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/

https://acotten.com/post/kube17-security

https://kubernetes.io/docs/admin/kube-apiserver/

https://github.com/kubernetes/features/issues/92

See Also

https://workbench.cisecurity.org/files/2662

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-28(1), CSCv6|14.5, CSCv7|14.8

Plugin: Unix

Control ID: a29511aee227bcabb035f92194ab4ef238a30df6a17e93e4e987b45421aa345c